mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-03-20T15:00:20.106219+00:00
This commit is contained in:
parent
7811867832
commit
0d0e9b7433
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-15870",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-09-03T12:15:11.467",
|
||||
"lastModified": "2024-11-21T04:29:38.710",
|
||||
"lastModified": "2025-03-20T13:25:43.420",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:carspot_project:carspot:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:scriptsbundle:carspot:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.1.7",
|
||||
"matchCriteriaId": "8DDCC65B-9B88-4FE7-959C-98A3AD0CDA03"
|
||||
"matchCriteriaId": "E9D6FAB6-A527-4D1A-B3E7-6A88E278ED6E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-16261",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-09-12T15:15:11.157",
|
||||
"lastModified": "2024-11-21T04:30:24.660",
|
||||
"lastModified": "2025-03-20T14:15:12.780",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -114,6 +114,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2025/Mar/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://blog.korelogic.com/blog/2019/08/19/unpatched_fringe_infrastructure_bits",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-21119",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-15T22:15:10.927",
|
||||
"lastModified": "2024-11-21T05:12:25.910",
|
||||
"lastModified": "2025-03-20T14:15:13.533",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-21120",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-15T22:15:10.983",
|
||||
"lastModified": "2024-11-21T05:12:26.050",
|
||||
"lastModified": "2025-03-20T14:15:13.800",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-33304",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-15T22:15:11.063",
|
||||
"lastModified": "2024-11-21T06:08:40.107",
|
||||
"lastModified": "2025-03-20T14:15:13.983",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-415"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-415"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-33396",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-15T22:15:11.123",
|
||||
"lastModified": "2024-11-21T06:08:47.997",
|
||||
"lastModified": "2025-03-20T14:15:14.160",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-33925",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-15T22:15:11.180",
|
||||
"lastModified": "2024-11-21T06:09:46.610",
|
||||
"lastModified": "2025-03-20T14:15:14.337",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-34117",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-15T22:15:11.250",
|
||||
"lastModified": "2024-11-21T06:09:55.043",
|
||||
"lastModified": "2025-03-20T14:15:14.507",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-38239",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-15T22:15:11.310",
|
||||
"lastModified": "2024-11-21T06:16:40.743",
|
||||
"lastModified": "2025-03-20T14:15:14.690",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-47208",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T00:15:07.920",
|
||||
"lastModified": "2024-11-21T06:35:37.923",
|
||||
"lastModified": "2025-03-20T14:15:14.867",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mojolicious/mojo/commit/a0c4576ffb11c235088550de9ba7ac4196e1953c",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-32473",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-15T03:15:10.097",
|
||||
"lastModified": "2024-11-21T07:06:24.023",
|
||||
"lastModified": "2025-03-20T14:15:15.110",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-32474",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-15T02:15:09.737",
|
||||
"lastModified": "2024-11-21T07:06:24.160",
|
||||
"lastModified": "2025-03-20T14:15:15.290",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-32476",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-15T03:15:10.177",
|
||||
"lastModified": "2024-11-21T07:06:24.440",
|
||||
"lastModified": "2025-03-20T14:15:15.457",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-32954",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-15T02:15:09.883",
|
||||
"lastModified": "2024-11-21T07:07:18.293",
|
||||
"lastModified": "2025-03-20T14:15:15.620",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22689",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-20T23:15:09.097",
|
||||
"lastModified": "2024-11-21T07:45:13.570",
|
||||
"lastModified": "2025-03-20T13:40:53.910",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,9 +76,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autoaffiliatelinks:auto_affiliate_links:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:flamescorpion:auto_affiliate_links:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "6.3",
|
||||
"matchCriteriaId": "093D2021-C336-443D-A9FE-2DF41D948C93"
|
||||
"matchCriteriaId": "D515857D-FD43-4EE0-A6FE-2A42C99ED21B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25973",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-03-13T15:15:12.447",
|
||||
"lastModified": "2024-11-21T07:50:32.697",
|
||||
"lastModified": "2025-03-20T13:40:53.910",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,9 +76,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autoaffiliatelinks:auto_affiliate_links:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:flamescorpion:auto_affiliate_links:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "6.3.0.3",
|
||||
"matchCriteriaId": "BFB369CE-2855-4841-89F5-8CB709D3B36F"
|
||||
"matchCriteriaId": "74C5735F-9B57-4476-B04B-A18673AF2D7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-37033",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-21T23:15:10.580",
|
||||
"lastModified": "2025-02-18T21:15:18.477",
|
||||
"lastModified": "2025-03-20T14:15:15.920",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-47652",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-13T04:15:08.497",
|
||||
"lastModified": "2024-11-21T08:30:36.437",
|
||||
"lastModified": "2025-03-20T13:40:53.910",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autoaffiliatelinks:auto_affiliate_links:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:flamescorpion:auto_affiliate_links:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "6.4.2.5",
|
||||
"matchCriteriaId": "962D4F05-9E3F-4836-B8F7-CC8BC9654900"
|
||||
"matchCriteriaId": "3979DDD3-A9ED-418D-B786-41CB0A5EAA8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-48986",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-14T09:15:36.130",
|
||||
"lastModified": "2024-11-21T08:32:40.900",
|
||||
"lastModified": "2025-03-20T14:15:16.100",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52340",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-05T02:15:09.747",
|
||||
"lastModified": "2024-11-21T08:39:35.620",
|
||||
"lastModified": "2025-03-20T14:15:16.297",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0762",
|
||||
"sourceIdentifier": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
|
||||
"published": "2024-05-14T16:15:53.287",
|
||||
"lastModified": "2025-02-13T18:16:15.227",
|
||||
"lastModified": "2025-03-20T14:15:16.470",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://eclypsium.com/blog/ueficanhazbufferoverflow-widespread-impact-from-vulnerability-in-popular-pc-and-server-firmware/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-10650",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:18.150",
|
||||
"lastModified": "2025-03-20T10:15:18.150",
|
||||
"lastModified": "2025-03-20T13:15:35.600",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/f820371d-a878-44bf-b1fd-2d837dd58eb4",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/f820371d-a878-44bf-b1fd-2d837dd58eb4",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-10721",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:19.020",
|
||||
"lastModified": "2025-03-20T10:15:19.020",
|
||||
"lastModified": "2025-03-20T14:15:16.777",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/a440a003-84c9-47b5-bfbd-675564abe3d8",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/a440a003-84c9-47b5-bfbd-675564abe3d8",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-10948",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:21.977",
|
||||
"lastModified": "2025-03-20T10:15:21.977",
|
||||
"lastModified": "2025-03-20T14:15:16.890",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/290a379d-8441-4292-a553-3587e8c5c729",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/290a379d-8441-4292-a553-3587e8c5c729",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-11030",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:22.707",
|
||||
"lastModified": "2025-03-20T10:15:22.707",
|
||||
"lastModified": "2025-03-20T14:15:17.473",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/729d9928-c28a-40fd-8a86-bb4ca2984bba",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/729d9928-c28a-40fd-8a86-bb4ca2984bba",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-11043",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:23.647",
|
||||
"lastModified": "2025-03-20T10:15:23.647",
|
||||
"lastModified": "2025-03-20T14:15:17.980",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/9270900a-b8b7-402f-aee5-432d891e5648",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/9270900a-b8b7-402f-aee5-432d891e5648",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-11822",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:25.677",
|
||||
"lastModified": "2025-03-20T10:15:25.677",
|
||||
"lastModified": "2025-03-20T14:15:18.070",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/f3042029-5d4e-41c6-850d-bbe02fae6592",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/f3042029-5d4e-41c6-850d-bbe02fae6592",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12048",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:26.503",
|
||||
"lastModified": "2025-03-20T10:15:26.503",
|
||||
"lastModified": "2025-03-20T13:15:35.717",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/6def3e3a-c443-44bb-b20e-3e69b48f37dc",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/6def3e3a-c443-44bb-b20e-3e69b48f37dc",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12070",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:27.110",
|
||||
"lastModified": "2025-03-20T10:15:27.110",
|
||||
"lastModified": "2025-03-20T14:15:18.200",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/8adac028-21c5-41ba-b785-b03066c0b2a6",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/8adac028-21c5-41ba-b785-b03066c0b2a6",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12387",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:28.010",
|
||||
"lastModified": "2025-03-20T10:15:28.010",
|
||||
"lastModified": "2025-03-20T13:15:35.803",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/02b4ab21-d29b-4cd7-ad80-f83081ce82a4",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/02b4ab21-d29b-4cd7-ad80-f83081ce82a4",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12720",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:29.507",
|
||||
"lastModified": "2025-03-20T10:15:29.507",
|
||||
"lastModified": "2025-03-20T14:15:18.290",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/4bed1214-7835-4252-a853-22bbad891f98",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/4bed1214-7835-4252-a853-22bbad891f98",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12766",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:30.000",
|
||||
"lastModified": "2025-03-20T10:15:30.000",
|
||||
"lastModified": "2025-03-20T14:15:18.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/a143a2e2-1293-4dec-b875-3312584bd2b1",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/a143a2e2-1293-4dec-b875-3312584bd2b1",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12777",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:30.360",
|
||||
"lastModified": "2025-03-20T10:15:30.360",
|
||||
"lastModified": "2025-03-20T14:15:18.477",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/cdf8db79-c290-4fe5-9383-4c518bfba4a8",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/cdf8db79-c290-4fe5-9383-4c518bfba4a8",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12779",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:30.600",
|
||||
"lastModified": "2025-03-20T10:15:30.600",
|
||||
"lastModified": "2025-03-20T13:15:35.893",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/3cc748ba-2afb-4bfe-8553-10eb6d6dd4f0",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/3cc748ba-2afb-4bfe-8553-10eb6d6dd4f0",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12871",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:31.340",
|
||||
"lastModified": "2025-03-20T10:15:31.340",
|
||||
"lastModified": "2025-03-20T14:15:18.563",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/7903945c-2839-4dd5-9d40-9ef47fe53118",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/7903945c-2839-4dd5-9d40-9ef47fe53118",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12910",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:31.960",
|
||||
"lastModified": "2025-03-20T10:15:31.960",
|
||||
"lastModified": "2025-03-20T14:15:18.657",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/27883f22-35ff-49df-aaa5-05031c7d6ad8",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/27883f22-35ff-49df-aaa5-05031c7d6ad8",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21028",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:18.350",
|
||||
"lastModified": "2024-11-21T08:53:38.853",
|
||||
"lastModified": "2025-03-20T14:15:19.000",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert_us@oracle.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24421",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-21T23:15:12.147",
|
||||
"lastModified": "2025-02-18T21:15:20.973",
|
||||
"lastModified": "2025-03-20T14:15:19.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una confusi\u00f3n de tipos en la funci\u00f3n nas_message_decode de Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete NAS manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cellularsecurity.org/ransacked",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27362",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-09T18:15:09.573",
|
||||
"lastModified": "2024-11-21T09:04:26.353",
|
||||
"lastModified": "2025-03-20T14:15:19.310",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-1284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-3637",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-05-03T06:15:14.367",
|
||||
"lastModified": "2024-11-21T09:30:03.153",
|
||||
"lastModified": "2025-03-20T14:15:19.667",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El complemento Responsive Contact Form Builder & Lead Generation Plugin WordPress hasta la versi\u00f3n 1.8.9 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo en configuraci\u00f3n multisitio)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/33f6fea6-c784-40ae-a548-55d41618752d/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-37392",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-23T21:15:07.253",
|
||||
"lastModified": "2025-01-09T18:15:27.790",
|
||||
"lastModified": "2025-03-20T14:15:19.487",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40843",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:49.060",
|
||||
"lastModified": "2024-09-24T15:02:53.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-20T14:15:19.813",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41481",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:30.733",
|
||||
"lastModified": "2024-08-13T14:51:33.017",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-20T14:15:19.977",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42639",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-16T18:15:10.067",
|
||||
"lastModified": "2024-08-19T18:35:13.310",
|
||||
"lastModified": "2025-03-20T14:15:20.170",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-259"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://palm-vertebra-fe9.notion.site/H3C-GR1100-PV100R009-was-discovered-to-contain-a-hardcoded-824141daa44f4c52a914860c6e4a7684",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42936",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-21T20:15:30.963",
|
||||
"lastModified": "2025-02-18T21:15:21.830",
|
||||
"lastModified": "2025-03-20T14:15:20.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "El componente de servicio mqlink.elf en Ruijie RG-EW300N con firmware ReyeeOS 1.300.1422 es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de un mensaje de agente MQTT modificado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/smrx86/2008111b12ab47882b3928d0cbc9e415",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44139",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:50.443",
|
||||
"lastModified": "2024-09-24T18:30:34.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-20T14:15:20.510",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46922",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-12T22:15:39.230",
|
||||
"lastModified": "2025-02-18T18:15:23.653",
|
||||
"lastModified": "2025-03-20T14:15:20.660",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 1480 y 2400. La ausencia de una verificaci\u00f3n nula conduce a una denegaci\u00f3n de servicio en amdgpu_cs_parser_bos en Xclipse Driver."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
|
21
CVE-2024/CVE-2024-485xx/CVE-2024-48590.json
Normal file
21
CVE-2024/CVE-2024-485xx/CVE-2024-48590.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-48590",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-20T14:15:20.830",
|
||||
"lastModified": "2025-03-20T14:15:20.830",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inflectra SpiraTeam 7.2.00 is vulnerable to Server-Side Request Forgery (SSRF) via the NewsReaderService. This allows an attacker to escalate privileges and obtain sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/GCatt-AS/CVE-2024-48590/blob/main/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-4990",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:32.603",
|
||||
"lastModified": "2025-03-20T10:15:32.603",
|
||||
"lastModified": "2025-03-20T14:15:20.940",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/4fbdd965-02b6-42e4-b57b-f98f93415b8f",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/4fbdd965-02b6-42e4-b57b-f98f93415b8f",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-50954",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-15T17:15:16.517",
|
||||
"lastModified": "2025-02-18T22:15:12.327",
|
||||
"lastModified": "2025-03-20T14:15:21.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Los controladores l\u00f3gicos programables XINJE XL5E-16T y XD5E-24R-E V3.5.3b-V3.7.2a tienen una vulnerabilidad en la gesti\u00f3n de mensajes Modbus. Cuando se establece una conexi\u00f3n TCP con la serie de controladores antes mencionada dentro de una red de \u00e1rea local (LAN), el env\u00edo de un mensaje Modbus espec\u00edfico al controlador puede provocar que el PLC se bloquee, interrumpiendo el funcionamiento normal de los programas que se ejecutan en el PLC. Esto hace que la luz indicadora ERR se encienda y la luz indicadora RUN se apague."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-703"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Curator-Kim/Vulnerability-mining/blob/master/XINJE%20XL5E-16T%20XD5E-24R%20Modbus/XINJE%20XL5E-16T%20XD5E-24R%20Modbus.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-57483",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-14T23:15:09.060",
|
||||
"lastModified": "2025-02-18T22:15:15.143",
|
||||
"lastModified": "2025-03-20T14:15:21.193",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Tenda i24 V2.0.0.5 es vulnerable a un desbordamiento de b\u00fafer en la funci\u00f3n addWifiMacFilter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-57660",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-14T01:15:14.860",
|
||||
"lastModified": "2025-02-18T22:15:15.830",
|
||||
"lastModified": "2025-03-20T14:15:21.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": " Un problema en el componente sqlo_expand_jts de openlink virtuoso-opensource v7.2.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openlink/virtuoso-opensource/issues/1221",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7053",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:36.217",
|
||||
"lastModified": "2025-03-20T10:15:36.217",
|
||||
"lastModified": "2025-03-20T14:15:21.553",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/947f8191-0abf-4adf-b7c4-d4c19683aba2",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/947f8191-0abf-4adf-b7c4-d4c19683aba2",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7767",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:37.007",
|
||||
"lastModified": "2025-03-20T10:15:37.007",
|
||||
"lastModified": "2025-03-20T14:15:21.697",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/1425dada-72d8-4bd9-a3e7-2863bb3e1a6c",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/1425dada-72d8-4bd9-a3e7-2863bb3e1a6c",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7773",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:37.393",
|
||||
"lastModified": "2025-03-20T10:15:37.393",
|
||||
"lastModified": "2025-03-20T14:15:21.793",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/aeb82e05-484f-4431-9ede-25a3478d8dbb",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/aeb82e05-484f-4431-9ede-25a3478d8dbb",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-8021",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:39.260",
|
||||
"lastModified": "2025-03-20T10:15:39.260",
|
||||
"lastModified": "2025-03-20T14:15:21.883",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/adc23067-ec04-47ef-9265-afd452071888",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/adc23067-ec04-47ef-9265-afd452071888",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-8053",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:39.993",
|
||||
"lastModified": "2025-03-20T10:15:39.993",
|
||||
"lastModified": "2025-03-20T14:15:21.977",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/ebe8c1fa-113b-4df9-be03-a406b9adb9f4",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/ebe8c1fa-113b-4df9-be03-a406b9adb9f4",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-8101",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:41.130",
|
||||
"lastModified": "2025-03-20T10:15:41.130",
|
||||
"lastModified": "2025-03-20T13:15:36.007",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/60cf2b93-a9a2-435e-a222-3d6abde26adb",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/60cf2b93-a9a2-435e-a222-3d6abde26adb",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-8156",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:41.247",
|
||||
"lastModified": "2025-03-20T10:15:41.247",
|
||||
"lastModified": "2025-03-20T14:15:22.073",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/959efe87-f109-4cef-94d8-90ff2c7aef51",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/959efe87-f109-4cef-94d8-90ff2c7aef51",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8487",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:42.360",
|
||||
"lastModified": "2025-03-20T10:15:42.360",
|
||||
"lastModified": "2025-03-20T13:15:36.117",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross-Origin Resource Sharing (CORS) vulnerability exists in modelscope/agentscope version v0.0.4. The CORS configuration on the agentscope server does not properly restrict access to only trusted origins, allowing any external domain to make requests to the API. This can lead to unauthorized data access, information disclosure, and potential further exploitation, thereby compromising the integrity and confidentiality of the system."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de Cross-Origin Resource Sharing (CORS) en modelscope/agentscope versi\u00f3n v0.0.4. La configuraci\u00f3n de CORS en el servidor de agentscope no restringe correctamente el acceso \u00fanicamente a or\u00edgenes de confianza, lo que permite que cualquier dominio externo realice solicitudes a la API. Esto puede provocar acceso no autorizado a datos, divulgaci\u00f3n de informaci\u00f3n y una posible explotaci\u00f3n posterior, comprometiendo as\u00ed la integridad y confidencialidad del sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +55,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/7aca7507-a94e-4e63-83a2-15648e5c4067",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/7aca7507-a94e-4e63-83a2-15648e5c4067",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8556",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:43.230",
|
||||
"lastModified": "2025-03-20T10:15:43.230",
|
||||
"lastModified": "2025-03-20T13:15:36.213",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored cross-site scripting (XSS) vulnerability exists in modelscope/agentscope, as of the latest commit 21161fe on the main branch. The vulnerability occurs in the view for inspecting detailed run information, where a user-controllable string (run ID) is appended and rendered as HTML. This allows an attacker to execute arbitrary JavaScript code in the context of the user's browser."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en modelscope/agentscope, a partir del \u00faltimo commit 21161fe en la rama principal. La vulnerabilidad se produce en la vista para inspeccionar informaci\u00f3n detallada de la ejecuci\u00f3n, donde se a\u00f1ade una cadena controlable por el usuario (ID de ejecuci\u00f3n) y se representa como HTML. Esto permite a un atacante ejecutar c\u00f3digo JavaScript arbitrario en el contexto del navegador del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +55,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/8439f16b-5256-4466-bb7d-371572572a4b",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/8439f16b-5256-4466-bb7d-371572572a4b",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8769",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:44.220",
|
||||
"lastModified": "2025-03-20T10:15:44.220",
|
||||
"lastModified": "2025-03-20T13:15:36.303",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la funci\u00f3n `LockManager.release_locks` de aimhubio/aim (commit bb76afe) permite la eliminaci\u00f3n arbitraria de archivos mediante un path traversal relativo. El par\u00e1metro `run_hash`, controlable por el usuario, se concatena sin normalizaci\u00f3n como parte de una ruta utilizada para especificar la eliminaci\u00f3n de archivos. Esta vulnerabilidad se expone mediante el m\u00e9todo `Repo._close_run()`, accesible mediante la API de instrucciones del servidor de seguimiento. Por lo tanto, un atacante puede explotarla para eliminar cualquier archivo arbitrario en la m\u00e1quina que ejecuta el servidor de seguimiento."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +55,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/59d3472f-f581-4beb-a090-afd36a00ecf7",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/59d3472f-f581-4beb-a090-afd36a00ecf7",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8958",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:45.220",
|
||||
"lastModified": "2025-03-20T10:15:45.220",
|
||||
"lastModified": "2025-03-20T14:15:22.220",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In composiohq/composio version 0.4.3, there is an unrestricted file write and read vulnerability in the filetools actions. Due to improper validation of file paths, an attacker can read and write files anywhere on the server, potentially leading to privilege escalation or remote code execution."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En composiohq/composio versi\u00f3n 0.4.3, existe una vulnerabilidad de escritura y lectura de archivos sin restricciones en las acciones de filetools. Debido a la validaci\u00f3n incorrecta de las rutas de archivo, un atacante puede leer y escribir archivos en cualquier parte del servidor, lo que podr\u00eda provocar una escalada de privilegios o la ejecuci\u00f3n remota de c\u00f3digo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +55,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/e152b094-0593-428e-b813-068d2390ce68",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/e152b094-0593-428e-b813-068d2390ce68",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-9612",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:49.560",
|
||||
"lastModified": "2025-03-20T10:15:49.560",
|
||||
"lastModified": "2025-03-20T14:15:22.310",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In danswer-ai/danswer v0.3.94, administrators can set the visibility of pages within a workspace, including the search page. When the search page is set to be invisible, regular users cannot view the search page or access its functionalities from the front-end interface. However, the back-end does not verify the visibility status of the search page. Consequently, attackers can directly call the API to access the functionalities provided by the search page, bypassing the visibility restriction set by the administrator."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En danswer-ai/danswer v0.3.94, los administradores pueden configurar la visibilidad de las p\u00e1ginas dentro de un espacio de trabajo, incluida la p\u00e1gina de b\u00fasqueda. Cuando la p\u00e1gina de b\u00fasqueda est\u00e1 configurada como invisible, los usuarios no pueden verla ni acceder a sus funciones desde la interfaz del frontend. Sin embargo, el backend no verifica el estado de visibilidad de la p\u00e1gina de b\u00fasqueda. Por lo tanto, los atacantes pueden llamar directamente a la API para acceder a las funciones de la p\u00e1gina de b\u00fasqueda, eludiendo la restricci\u00f3n de visibilidad establecida por el administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +55,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/c1046fa0-a719-475e-ba62-2b97873fbac4",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/c1046fa0-a719-475e-ba62-2b97873fbac4",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-9900",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-03-20T10:15:50.417",
|
||||
"lastModified": "2025-03-20T10:15:50.417",
|
||||
"lastModified": "2025-03-20T14:15:22.403",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "mudler/localai version v2.21.1 contains a Cross-Site Scripting (XSS) vulnerability in its search functionality. The vulnerability arises due to improper sanitization of user input, allowing the injection and execution of arbitrary JavaScript code. This can lead to the execution of malicious scripts in the context of the victim's browser, potentially compromising user sessions, stealing session cookies, redirecting users to malicious websites, or manipulating the DOM."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La versi\u00f3n 2.21.1 de mudler/localai contiene una vulnerabilidad de Cross-Site Scripting (XSS) en su funci\u00f3n de b\u00fasqueda. Esta vulnerabilidad surge debido a una depuraci\u00f3n inadecuada de la entrada del usuario, lo que permite la inyecci\u00f3n y ejecuci\u00f3n de c\u00f3digo JavaScript arbitrario. Esto puede provocar la ejecuci\u00f3n de scripts maliciosos en el navegador de la v\u00edctima, lo que podr\u00eda comprometer las sesiones del usuario, robar cookies de sesi\u00f3n, redirigir a los usuarios a sitios web maliciosos o manipular el DOM."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +59,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/b39cd230-db66-471b-89b9-24afaa078e68",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/b39cd230-db66-471b-89b9-24afaa078e68",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2025/CVE-2025-02xx/CVE-2025-0254.json
Normal file
44
CVE-2025/CVE-2025-02xx/CVE-2025-0254.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-0254",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2025-03-20T14:15:22.493",
|
||||
"lastModified": "2025-03-20T14:15:22.493",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HCL Digital Experience components Ring API and dxclient may be vulnerable to man-in-the-middle (MitM) attacks prior to 9.5 CF226. An attacker could intercept and potentially alter communication between two parties."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120000",
|
||||
"source": "psirt@hcl.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-0438",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-01-15T11:15:09.930",
|
||||
"lastModified": "2025-02-18T22:15:16.743",
|
||||
"lastModified": "2025-03-20T14:15:22.613",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El desbordamiento del b\u00fafer de pila en el rastreo de Google Chrome anterior a la versi\u00f3n 132.0.6834.83 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n de la pila a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: alta)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
@ -26,6 +49,16 @@
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-1066",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2025-02-06T00:15:27.760",
|
||||
"lastModified": "2025-02-18T19:15:24.243",
|
||||
"lastModified": "2025-03-20T14:15:22.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "OpenPlc_V3 contiene una vulnerabilidad de carga arbitraria de archivo, que podr\u00eda aprovecharse para las campa\u00f1as de malvertimiento o phishing."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/thiagoralves/OpenPLC_v3/commit/d1b1a3b7e97f2b3fef0876056cf9d7879991744a",
|
||||
|
60
CVE-2025/CVE-2025-14xx/CVE-2025-1496.json
Normal file
60
CVE-2025/CVE-2025-14xx/CVE-2025-1496.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-1496",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2025-03-20T14:15:22.920",
|
||||
"lastModified": "2025-03-20T14:15:22.920",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Restriction of Excessive Authentication Attempts vulnerability in BG-TEK Coslat Hotspot allows Password Brute Forcing, Authentication Abuse.This issue affects Coslat Hotspot: before 6.26.0.R.20250227."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.coslat.com/tr/blog/28-02-2025-guncelleme",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
},
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-25-0075",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1508",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-12T04:15:16.520",
|
||||
"lastModified": "2025-03-12T04:15:16.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-20T13:57:41.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,16 +49,50 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themeum:wp_crowdfunding:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.1.13",
|
||||
"matchCriteriaId": "C04CAA7D-BAD6-4A60-8AFD-601C6B40D092"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/wp-crowdfunding/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/70a93afa-9801-41d2-8923-ca4ae6ae974f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-22904",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T03:15:06.313",
|
||||
"lastModified": "2025-02-18T21:15:26.993",
|
||||
"lastModified": "2025-03-20T14:15:23.117",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": " Se descubri\u00f3 que RE11S v1.11 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro pptpUserName en la funci\u00f3n setWAN."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://re11s.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-22912",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T03:15:06.723",
|
||||
"lastModified": "2025-02-18T21:15:27.630",
|
||||
"lastModified": "2025-03-20T14:15:23.270",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": " Se descubri\u00f3 que RE11S v1.11 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del componente /goform/formAccept."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://re11s.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-22913",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T03:15:06.850",
|
||||
"lastModified": "2025-02-18T21:15:27.790",
|
||||
"lastModified": "2025-03-20T14:15:23.423",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": " Se descubri\u00f3 que RE11S v1.11 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro rootAPmac en la funci\u00f3n formStaDrvSetup."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xyqer1/RE11S_1.11-formStaDrvSetup-StackOverflow",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-23007",
|
||||
"sourceIdentifier": "PSIRT@sonicwall.com",
|
||||
"published": "2025-01-30T10:15:09.283",
|
||||
"lastModified": "2025-02-18T19:15:27.263",
|
||||
"lastModified": "2025-03-20T14:15:23.570",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,11 +15,34 @@
|
||||
"value": "Una vulnerabilidad en la funci\u00f3n de exportaci\u00f3n de registros del cliente Windows de NetExtender permite el acceso no autorizado a archivos confidenciales de Windows sistema, lo que podr\u00eda conducir a una escalada de privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "PSIRT@sonicwall.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24201",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-11T18:15:30.190",
|
||||
"lastModified": "2025-03-14T20:35:27.923",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-20T14:15:23.733",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -155,6 +155,18 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2025/Mar/2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2025/Mar/3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2025/Mar/4",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-24400",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2025-01-22T17:15:13.943",
|
||||
"lastModified": "2025-02-18T20:15:31.630",
|
||||
"lastModified": "2025-03-20T14:15:23.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "El complemento Jenkins Eiffel Broadcaster 2.8.0 a 2.10.2 (ambos incluidos) utiliza el ID de credencial como clave de cach\u00e9 durante las operaciones de firma, lo que permite a los atacantes crear una credencial con el mismo ID que una leg\u00edtima en un almac\u00e9n de credenciales diferente para firmar un evento publicado en RabbitMQ con las credenciales leg\u00edtimas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3485",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-25291",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-12T21:15:42.000",
|
||||
"lastModified": "2025-03-15T21:15:34.987",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-20T14:15:24.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -22,9 +22,9 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
@ -36,7 +36,7 @@
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
@ -110,6 +110,10 @@
|
||||
"url": "https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://portswigger.net/research/saml-roulette-the-hacker-always-wins",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://news.ycombinator.com/item?id=43374519",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-25292",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-12T21:15:42.177",
|
||||
"lastModified": "2025-03-15T21:15:35.143",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-20T14:15:24.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -22,9 +22,9 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
@ -36,7 +36,7 @@
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
@ -110,6 +110,10 @@
|
||||
"url": "https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://portswigger.net/research/saml-roulette-the-hacker-always-wins",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://news.ycombinator.com/item?id=43374519",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-26318",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-04T21:15:13.897",
|
||||
"lastModified": "2025-03-05T17:15:16.180",
|
||||
"lastModified": "2025-03-20T14:15:24.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure permissions in TSplus Remote Access v17.30 allow attackers to retrieve a list of all domain accounts currently connected to the application."
|
||||
"value": "hb.exe in TSplus Remote Access before 17.30 2024-10-30 allows remote attackers to retrieve a list of all domain accounts currently connected to the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-201"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
|
21
CVE-2025/CVE-2025-291xx/CVE-2025-29101.json
Normal file
21
CVE-2025/CVE-2025-291xx/CVE-2025-29101.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-29101",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-20T13:15:36.467",
|
||||
"lastModified": "2025-03-20T13:15:36.467",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC8V4.0 V16.03.34.06 was discovered to contain a stack overflow via the deviceid parameter in the get_parentControl_list_Info function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Raining-101/IOT_cve/blob/main/tenda-ac8_get_parentControl_list_Info_overflow.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-294xx/CVE-2025-29410.json
Normal file
25
CVE-2025/CVE-2025-294xx/CVE-2025-29410.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-29410",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-20T14:15:24.540",
|
||||
"lastModified": "2025-03-20T14:15:24.540",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the component /contact.php of Hospital Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the txtEmail parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kishan0725/Hospital-Management-System/issues/49",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.simonjuguna.com/cve-2025-29410-hospital-management-system-xss-vulnerability/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-294xx/CVE-2025-29412.json
Normal file
25
CVE-2025/CVE-2025-294xx/CVE-2025-29412.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-29412",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-20T14:15:24.653",
|
||||
"lastModified": "2025-03-20T14:15:24.653",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the Client Profile Update section of Mart Developers iBanking v2.0.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MartMbithi/iBanking/issues/11",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.simonjuguna.com/cve-2025-29412-cross-site-scripting-xss-vulnerability-in-ibanking-v2-0-0/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
58
README.md
58
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-20T13:00:20.269254+00:00
|
||||
2025-03-20T15:00:20.106219+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-20T12:25:42+00:00
|
||||
2025-03-20T14:15:24.653000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,36 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
286077
|
||||
286083
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-13558](CVE-2024/CVE-2024-135xx/CVE-2024-13558.json) (`2025-03-20T12:15:13.193`)
|
||||
- [CVE-2024-13920](CVE-2024/CVE-2024-139xx/CVE-2024-13920.json) (`2025-03-20T12:15:13.477`)
|
||||
- [CVE-2024-13921](CVE-2024/CVE-2024-139xx/CVE-2024-13921.json) (`2025-03-20T12:15:13.633`)
|
||||
- [CVE-2024-13922](CVE-2024/CVE-2024-139xx/CVE-2024-13922.json) (`2025-03-20T12:15:13.777`)
|
||||
- [CVE-2024-13923](CVE-2024/CVE-2024-139xx/CVE-2024-13923.json) (`2025-03-20T12:15:13.933`)
|
||||
- [CVE-2025-1802](CVE-2025/CVE-2025-18xx/CVE-2025-1802.json) (`2025-03-20T12:15:14.413`)
|
||||
- [CVE-2025-2311](CVE-2025/CVE-2025-23xx/CVE-2025-2311.json) (`2025-03-20T12:15:14.750`)
|
||||
- [CVE-2025-2539](CVE-2025/CVE-2025-25xx/CVE-2025-2539.json) (`2025-03-20T12:15:14.900`)
|
||||
- [CVE-2025-27888](CVE-2025/CVE-2025-278xx/CVE-2025-27888.json) (`2025-03-20T12:15:14.563`)
|
||||
- [CVE-2024-48590](CVE-2024/CVE-2024-485xx/CVE-2024-48590.json) (`2025-03-20T14:15:20.830`)
|
||||
- [CVE-2025-0254](CVE-2025/CVE-2025-02xx/CVE-2025-0254.json) (`2025-03-20T14:15:22.493`)
|
||||
- [CVE-2025-1496](CVE-2025/CVE-2025-14xx/CVE-2025-1496.json) (`2025-03-20T14:15:22.920`)
|
||||
- [CVE-2025-29101](CVE-2025/CVE-2025-291xx/CVE-2025-29101.json) (`2025-03-20T13:15:36.467`)
|
||||
- [CVE-2025-29410](CVE-2025/CVE-2025-294xx/CVE-2025-29410.json) (`2025-03-20T14:15:24.540`)
|
||||
- [CVE-2025-29412](CVE-2025/CVE-2025-294xx/CVE-2025-29412.json) (`2025-03-20T14:15:24.653`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `8`
|
||||
Recently modified CVEs: `76`
|
||||
|
||||
- [CVE-2024-1763](CVE-2024/CVE-2024-17xx/CVE-2024-1763.json) (`2025-03-20T11:05:42.940`)
|
||||
- [CVE-2024-31296](CVE-2024/CVE-2024-312xx/CVE-2024-31296.json) (`2025-03-20T11:23:10.463`)
|
||||
- [CVE-2024-34799](CVE-2024/CVE-2024-347xx/CVE-2024-34799.json) (`2025-03-20T11:11:29.417`)
|
||||
- [CVE-2024-54444](CVE-2024/CVE-2024-544xx/CVE-2024-54444.json) (`2025-03-20T12:11:53.293`)
|
||||
- [CVE-2024-56259](CVE-2024/CVE-2024-562xx/CVE-2024-56259.json) (`2025-03-20T11:30:46.587`)
|
||||
- [CVE-2025-22806](CVE-2025/CVE-2025-228xx/CVE-2025-22806.json) (`2025-03-20T11:25:38.747`)
|
||||
- [CVE-2025-26772](CVE-2025/CVE-2025-267xx/CVE-2025-26772.json) (`2025-03-20T12:20:45.623`)
|
||||
- [CVE-2025-26917](CVE-2025/CVE-2025-269xx/CVE-2025-26917.json) (`2025-03-20T12:25:42.000`)
|
||||
- [CVE-2024-7053](CVE-2024/CVE-2024-70xx/CVE-2024-7053.json) (`2025-03-20T14:15:21.553`)
|
||||
- [CVE-2024-7767](CVE-2024/CVE-2024-77xx/CVE-2024-7767.json) (`2025-03-20T14:15:21.697`)
|
||||
- [CVE-2024-7773](CVE-2024/CVE-2024-77xx/CVE-2024-7773.json) (`2025-03-20T14:15:21.793`)
|
||||
- [CVE-2024-8021](CVE-2024/CVE-2024-80xx/CVE-2024-8021.json) (`2025-03-20T14:15:21.883`)
|
||||
- [CVE-2024-8053](CVE-2024/CVE-2024-80xx/CVE-2024-8053.json) (`2025-03-20T14:15:21.977`)
|
||||
- [CVE-2024-8101](CVE-2024/CVE-2024-81xx/CVE-2024-8101.json) (`2025-03-20T13:15:36.007`)
|
||||
- [CVE-2024-8156](CVE-2024/CVE-2024-81xx/CVE-2024-8156.json) (`2025-03-20T14:15:22.073`)
|
||||
- [CVE-2024-8487](CVE-2024/CVE-2024-84xx/CVE-2024-8487.json) (`2025-03-20T13:15:36.117`)
|
||||
- [CVE-2024-8556](CVE-2024/CVE-2024-85xx/CVE-2024-8556.json) (`2025-03-20T13:15:36.213`)
|
||||
- [CVE-2024-8769](CVE-2024/CVE-2024-87xx/CVE-2024-8769.json) (`2025-03-20T13:15:36.303`)
|
||||
- [CVE-2024-8958](CVE-2024/CVE-2024-89xx/CVE-2024-8958.json) (`2025-03-20T14:15:22.220`)
|
||||
- [CVE-2024-9612](CVE-2024/CVE-2024-96xx/CVE-2024-9612.json) (`2025-03-20T14:15:22.310`)
|
||||
- [CVE-2024-9900](CVE-2024/CVE-2024-99xx/CVE-2024-9900.json) (`2025-03-20T14:15:22.403`)
|
||||
- [CVE-2025-0438](CVE-2025/CVE-2025-04xx/CVE-2025-0438.json) (`2025-03-20T14:15:22.613`)
|
||||
- [CVE-2025-1066](CVE-2025/CVE-2025-10xx/CVE-2025-1066.json) (`2025-03-20T14:15:22.783`)
|
||||
- [CVE-2025-1508](CVE-2025/CVE-2025-15xx/CVE-2025-1508.json) (`2025-03-20T13:57:41.123`)
|
||||
- [CVE-2025-22904](CVE-2025/CVE-2025-229xx/CVE-2025-22904.json) (`2025-03-20T14:15:23.117`)
|
||||
- [CVE-2025-22912](CVE-2025/CVE-2025-229xx/CVE-2025-22912.json) (`2025-03-20T14:15:23.270`)
|
||||
- [CVE-2025-22913](CVE-2025/CVE-2025-229xx/CVE-2025-22913.json) (`2025-03-20T14:15:23.423`)
|
||||
- [CVE-2025-23007](CVE-2025/CVE-2025-230xx/CVE-2025-23007.json) (`2025-03-20T14:15:23.570`)
|
||||
- [CVE-2025-24201](CVE-2025/CVE-2025-242xx/CVE-2025-24201.json) (`2025-03-20T14:15:23.733`)
|
||||
- [CVE-2025-24400](CVE-2025/CVE-2025-244xx/CVE-2025-24400.json) (`2025-03-20T14:15:23.903`)
|
||||
- [CVE-2025-25291](CVE-2025/CVE-2025-252xx/CVE-2025-25291.json) (`2025-03-20T14:15:24.050`)
|
||||
- [CVE-2025-25292](CVE-2025/CVE-2025-252xx/CVE-2025-25292.json) (`2025-03-20T14:15:24.213`)
|
||||
- [CVE-2025-26318](CVE-2025/CVE-2025-263xx/CVE-2025-26318.json) (`2025-03-20T14:15:24.353`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
192
_state.csv
192
_state.csv
@ -133872,7 +133872,7 @@ CVE-2019-15867,0,0,e2f893b6c12bb5c6f52df86e8c5d3e121a9761bae0c1a9e40415749f409b7
|
||||
CVE-2019-15868,0,0,b4985bacf8258d5959dfe891c4078646851866fa53afe4859091247ebb3a5790,2024-11-21T04:29:38.430000
|
||||
CVE-2019-15869,0,0,cb6c15040cd062f924782cbc26185f69b4a71b5bb10dce6b6076f4aac89cc278,2024-11-21T04:29:38.573000
|
||||
CVE-2019-1587,0,0,0bbebc5cc86721970e8ed7983514880cd235caf37346d19e7941d110eaf0e0fa,2024-11-21T04:36:51.910000
|
||||
CVE-2019-15870,0,0,bd16a4d7d36913a24ffd14155f27f21e22879218444bdc8f84ac5105df3115ea,2024-11-21T04:29:38.710000
|
||||
CVE-2019-15870,0,1,27068818a7b8faae345aad41847941368f183508d413e9518f5de6b3223284c1,2025-03-20T13:25:43.420000
|
||||
CVE-2019-15871,0,0,aa321dd91356707b1798ed1ba23d2660b1b764556be5079d38329ec76305fcb5,2024-11-21T04:29:38.847000
|
||||
CVE-2019-15872,0,0,4b7aa7edad56fbec07628d36cce9e8923723f8502aeac2bbd99d6666039f9ded,2024-11-21T04:29:38.993000
|
||||
CVE-2019-15873,0,0,4b0dae3a5cba7ead9b21d96207d918d8fea72c04628a1b1a5c6dd28cb6945a86,2024-11-21T04:29:39.140000
|
||||
@ -134228,7 +134228,7 @@ CVE-2019-16256,0,0,ebb97b4d7f8f0a3a34d08ece6515e76af72bbbf2a88dcdecc15ab725b2f7e
|
||||
CVE-2019-16257,0,0,658bbaed8ae9eef0b5653cb8c146b31cbd2a01045dc148866667df9b5c205bb7,2024-11-21T04:30:24.363000
|
||||
CVE-2019-16258,0,0,ee2ee9e98fd1c470f1fce700131597f6e66006f164cd3aad4f32444cfb7d0e6e,2024-11-21T04:30:24.503000
|
||||
CVE-2019-1626,0,0,fcd01ff021271eae6b11a40589c2f3a36ac97bd718574e8ce82e0d17b4881ba5,2024-11-21T04:36:57.660000
|
||||
CVE-2019-16261,0,0,67223b4da1143d22817d5c9751786d17010b70104805070177cb3b12237e89f7,2024-11-21T04:30:24.660000
|
||||
CVE-2019-16261,0,1,56f9734c27ed81d33d47abfdb77bff245c1fb710cb973ffab351d26b74b7cbf2,2025-03-20T14:15:12.780000
|
||||
CVE-2019-16263,0,0,381c5aca433aa69b0cd64a4ff45a92479afd0edf4abeeee7602e0f0a60d52bf2,2024-11-21T04:30:24.800000
|
||||
CVE-2019-16264,0,0,3dc97ec4d5f7b0bef578332d3d345d478c789a8507daebe5c05ec09aa9630615,2024-11-21T04:30:24.947000
|
||||
CVE-2019-16265,0,0,e4a079d0ebf8137888491d559e0288a4f9eddb04cb3530a4a7b28f0dd770e29f,2024-11-21T04:30:25.090000
|
||||
@ -153041,9 +153041,9 @@ CVE-2020-2109,0,0,911b2a1a8b7cfdb07d0738a45eb45783b09d9eab91544184082afba31347c3
|
||||
CVE-2020-2110,0,0,b935a970394fc609e51a69ca81098879503e4c960c482de9ba2609a7f243262a,2024-11-21T05:24:40.027000
|
||||
CVE-2020-21101,0,0,d1e69a8dd958392783f066b96daf322fd5e296a335a0c4f8a7b539154fec86c6,2024-11-21T05:12:25.770000
|
||||
CVE-2020-2111,0,0,dea356baf3f51a2ed9cd1ff8e65d2bc8838854d6e5ba3f65d0fbf2d24f6fd4c9,2024-11-21T05:24:40.257000
|
||||
CVE-2020-21119,0,0,e43dbba0537500c7a5349dde726b30eb85705eacb509f2669d743994ada5c9f0,2024-11-21T05:12:25.910000
|
||||
CVE-2020-21119,0,1,11f0d1ec7c72add8106b95f70712281f57372fa55f67c671b094728f054dc63b,2025-03-20T14:15:13.533000
|
||||
CVE-2020-2112,0,0,1093e51f816a82fb256376815009a7d66348d7536f4ce33e000cd59451ff4141,2024-11-21T05:24:40.473000
|
||||
CVE-2020-21120,0,0,ed85e91e0f25c72ca2c60b35bc30c575eab0946d8909321e6d0632b8f2389c5e,2024-11-21T05:12:26.050000
|
||||
CVE-2020-21120,0,1,864ed203a4f22357ec5b4d2e771a4cbac28e2ce3b976210b085b2d5ca3217329,2025-03-20T14:15:13.800000
|
||||
CVE-2020-21121,0,0,9e2fc364cb99c077f690f15cf46d364e9a02118b329d6904d1090f21dd6f599e,2024-11-21T05:12:26.190000
|
||||
CVE-2020-21122,0,0,b2c5ee8172af01dafde9ea209b9382cd5b6d915b0a71190359434f3406b304bb,2024-11-21T05:12:26.327000
|
||||
CVE-2020-21124,0,0,ee35515d5adeb5b0e8643015b0d8644264884082d037c2c0f44e30f63fb29b7b,2024-11-21T05:12:26.470000
|
||||
@ -177208,7 +177208,7 @@ CVE-2021-33293,0,0,cfbd5bd296f5fd5df8283a4caa638c2d1d2a07e14835bf77838509effc5bd
|
||||
CVE-2021-33294,0,0,8688c6bcd1f1461eadab43f53d7d7b6dc1277766bdaf61fce44c228a2b32b2f4,2024-11-21T06:08:39.810000
|
||||
CVE-2021-33295,0,0,3a40b00545548ab3537c8fc6abeb1e24a53ff18ca3f20ab5973ce8ee577f0496,2024-11-21T06:08:39.953000
|
||||
CVE-2021-3330,0,0,620bf446116b68cb1793cfdc9c27e9dc8a9a8ad3c66584a5be07953dc4b8b14d,2024-11-21T06:21:18.670000
|
||||
CVE-2021-33304,0,0,d8a0fc7e3be98ed8f3dfffbabad65d073d3c94d21b16d459d4f69f14514d707d,2024-11-21T06:08:40.107000
|
||||
CVE-2021-33304,0,1,e3ae22fe88c7b427891cb18cf949fded4730e6c10b7a45a2edd6905ce0bb435f,2025-03-20T14:15:13.983000
|
||||
CVE-2021-3331,0,0,250284b64af0fda388656e09ee4789a4ad80a8008dec0f4e985185460514cd02,2024-11-21T06:21:18.807000
|
||||
CVE-2021-33315,0,0,fa3a9219b8b4d034eb16204a1ff9559c5f386fe5825e04bf9cb6be1ca97cf857,2024-11-21T06:08:40.260000
|
||||
CVE-2021-33316,0,0,8bd186aa82243d9229a860a3ddd9239d1852b4953e141bb64111174ba5888f88,2024-11-21T06:08:40.430000
|
||||
@ -177264,7 +177264,7 @@ CVE-2021-33390,0,0,9debe9cd8884108b647eb049f4fb7299548c130868eb233a2569410012185
|
||||
CVE-2021-33391,0,0,f6b277d645b4fc48d0578a577390e64936b9f2b495f1308e66e32bd09d3dfe8d,2025-03-18T19:15:39.667000
|
||||
CVE-2021-33393,0,0,2398a32e024043a67e8b4594658ebb58fb8ab1b6b1e4bdd1ce14c5cfd0d649cf,2024-11-21T06:08:47.673000
|
||||
CVE-2021-33394,0,0,6587515c1ed1bbb42da475b143eaeb8fd140105c9052bee581eadc3f967a5950,2024-11-21T06:08:47.850000
|
||||
CVE-2021-33396,0,0,c0b8e5cdb15aa941d2c15a75d37be1e32b85badb00a4d50490f5fcb8cab81c8a,2024-11-21T06:08:47.997000
|
||||
CVE-2021-33396,0,1,8ffc6038b0063ebd4479714a5fdb7797ec8f5d9ed1e5ee00ead96e326e63e143,2025-03-20T14:15:14.160000
|
||||
CVE-2021-3340,0,0,43fceaaf19c34788e87be50bb5e9b5e5231d8251cd07e30b0a4aa7d807d12cb1,2024-11-21T06:21:19.910000
|
||||
CVE-2021-33403,0,0,a8721fb52205f1989b17faa319c5a3c85e1ee9ce9b7cb3c3aa5a0975794b18b8,2024-11-21T06:08:48.150000
|
||||
CVE-2021-33408,0,0,f7053cd2105009507fd2bc29b1e8bfb13ee136bf10636f2943fc6ee23b813e30,2024-11-21T06:08:48.297000
|
||||
@ -177676,7 +177676,7 @@ CVE-2021-33913,0,0,a8db3fa1075732db6ad2a34ab37e425afc3e4b6fdcf539743ee3c062ccc8d
|
||||
CVE-2021-3392,0,0,39f56825c594ad5ef4e342ff77305b020f2290c4843747cc27200fa237a07c0b,2024-11-21T06:21:24.040000
|
||||
CVE-2021-33923,0,0,67c51da5e479b0e5ba09ad14b8ada6891ff671adbc38df696fc7a406cbad9e4d,2024-11-21T06:09:46.297000
|
||||
CVE-2021-33924,0,0,ac4cad509663cbab013ea9c074178cfb0a6134447a8a229eb13a5c06d6635e05,2024-11-21T06:09:46.463000
|
||||
CVE-2021-33925,0,0,801180f41f7af64053defd424416677863899033e102ee3a2c416d723ef17308,2024-11-21T06:09:46.610000
|
||||
CVE-2021-33925,0,1,a7e0eb210dc205cc3cfda2c41831335085ad1079255d666a96e5690cc04e5992,2025-03-20T14:15:14.337000
|
||||
CVE-2021-33926,0,0,0aee84c844cc22c0e7d4860eeae0ac96ebc7b124b534fc5b091ee49eab0e890a,2025-03-19T15:15:36.160000
|
||||
CVE-2021-33928,0,0,3e32495de4acd14fa1f18090d4f3b53e3fb6bf721f73f5d92d0a86ade82f254c,2024-11-21T06:09:46.943000
|
||||
CVE-2021-33929,0,0,4d8d162d4f56e36032ada44f5d21f539a9536ae49554b4e1e75bc44753b17320,2024-11-21T06:09:47.090000
|
||||
@ -177744,7 +177744,7 @@ CVE-2021-3410,0,0,8dbb81e123ef7142eec41b85c29407647dc63005bccb29cfb7f5200c9c404e
|
||||
CVE-2021-3411,0,0,7f0765e85a9d4142b120b20ce89b2f3a36917a0c7bfcedd210a0622257afd387,2024-11-21T06:21:26.693000
|
||||
CVE-2021-34110,0,0,8bfa5264584cd4ab64a2bd239cf004d062de6739233dbb312f9dd511db9c37f7,2024-11-21T06:09:54.710000
|
||||
CVE-2021-34111,0,0,5e84a6ee7d8ca89e41fe696b4c3b19928857200e02f4762d22ad32baadb61e9a,2024-11-21T06:09:54.890000
|
||||
CVE-2021-34117,0,0,83fab81411d6b6d608fefea16bd2605366b56939482451b1210fc105f3551169,2024-11-21T06:09:55.043000
|
||||
CVE-2021-34117,0,1,989f8ebc7a358cf03495bceff6adec4f0e5735f019e15d478ee44f058eb12a36,2025-03-20T14:15:14.507000
|
||||
CVE-2021-34119,0,0,6ae985f378a06975addd2ac6934afbadf6c1dfdf740b999590b85675579674fd,2024-11-21T06:09:55.203000
|
||||
CVE-2021-3412,0,0,969aea9f7608ee2e680dd204564a144bea3f1efb6905996914633fe17dd48a53,2024-11-21T06:21:26.827000
|
||||
CVE-2021-34121,0,0,b5867846d0acdb409b6dac5a79e0fb08f07abb2f06f8adeffd6242b203d43d82,2024-11-21T06:09:55.387000
|
||||
@ -180801,7 +180801,7 @@ CVE-2021-38217,0,0,5f92025d6664d9fac001b4f5c8e46c0c2b31e8a5f9a207db4851728cd8fcb
|
||||
CVE-2021-3822,0,0,2c1cea2a33f0b734bdacad419b58faa48c00be825df941b8eb356ddfcc6f4c5e,2024-11-21T06:22:32.387000
|
||||
CVE-2021-38221,0,0,2c3a43c52098cba3ccb0b8190bb9af3457397d4f41343d0a1abaebc393dd2730,2024-11-21T06:16:40.570000
|
||||
CVE-2021-3823,0,0,16fbc86bb4280b540541def3f36379d930837f7052199396a1f3021bbd6fcd9c,2024-11-21T06:22:32.543000
|
||||
CVE-2021-38239,0,0,98c20d6de4a3b8158323857d099cae61ec3394ea0468d33c0a8b64b03e4286e5,2024-11-21T06:16:40.743000
|
||||
CVE-2021-38239,0,1,fd7279ba4fda4e538326f39ad881be8b6b34a8100accb8f751f883d6af21f674,2025-03-20T14:15:14.690000
|
||||
CVE-2021-3824,0,0,16cdcbf7456cc1de3e56f0ba38e8bb500104a78d859f82b3558e26d67527c60d,2024-11-21T06:22:32.693000
|
||||
CVE-2021-38241,0,0,3f27086093c284bcc8fb9690b4ab556e440caad1bc441193cbd15c70a2a42742,2024-11-21T06:16:40.907000
|
||||
CVE-2021-38243,0,0,f90cb7bdb308cddde282f7faea7065bd23e4a0c7cf99d49db85a2d11282e77f0,2024-11-21T06:16:41.073000
|
||||
@ -187498,7 +187498,7 @@ CVE-2021-47204,0,0,d855ea7a1c34fec98e08b6ec6fc4b87aa056a23800ca368fb608f86f4465f
|
||||
CVE-2021-47205,0,0,549c8ae254d28d7ac269df29364fd85d999eba14823bb753afbe9412e13374e4,2025-03-04T15:27:32.420000
|
||||
CVE-2021-47206,0,0,6c20cc18955b069ca564695979ba4d69e50258ddcc033c348c73d4096f845cb1,2025-01-07T17:12:26.390000
|
||||
CVE-2021-47207,0,0,be89cb642a87a43cfb086c29deaea9f168d7b93104889775861d4b914bc2974c,2025-01-13T20:42:37.580000
|
||||
CVE-2021-47208,0,0,0aedc6593001cbe298d9e706064e1d980e47bb2fd7444fd7cad250e7521e5eb1,2024-11-21T06:35:37.923000
|
||||
CVE-2021-47208,0,1,1530409a9601a0907c9eb35e42d9ec9620e69106ced76ea9e3ebfe673f296458,2025-03-20T14:15:14.867000
|
||||
CVE-2021-47209,0,0,1536c1bef2c14e12d373ca6bd92154342840694d5f784ecde3999106c390f9bf,2024-11-21T06:35:38.130000
|
||||
CVE-2021-47210,0,0,6f92e3d2c3c1a5d96775ad98a3288fba55e822f3f6095cf6048826173f313db7,2024-11-21T06:35:38.243000
|
||||
CVE-2021-47211,0,0,c3bfb66ece2fcfaecd7a9c09b11fb23218079e6a89ad9ae3b4e7290a749fa7ef,2025-01-14T14:43:27.637000
|
||||
@ -200622,10 +200622,10 @@ CVE-2022-3247,0,0,798be43c1df50489fffe791774c6316e02ce9b899b403a3ca2aa4cf8b4d32d
|
||||
CVE-2022-32470,0,0,fdf6dc97f1e2f6fc37f7f89d520eeac076b76b8a567b98d66b18d4ac8309039a,2024-11-21T07:06:23.723000
|
||||
CVE-2022-32471,0,0,3d1ad8a0eda6ac3ff51e8f7b014ff1fa094f06a2f954babeb9f348bbcfa9e441,2024-11-21T07:06:23.867000
|
||||
CVE-2022-32472,0,0,d44e1e699128958fcde2e446998f75a39b64b8ec564bad6a65299df28ad483d5,2023-11-07T03:47:48.977000
|
||||
CVE-2022-32473,0,0,d431ac4e9b9151b71aeb656ede00de7fdef95d6d42c57070107745ebe5348253,2024-11-21T07:06:24.023000
|
||||
CVE-2022-32474,0,0,8d455aa0c29194a413549d12877eb83fcec7e4343efa0aef295f29d8c5662f73,2024-11-21T07:06:24.160000
|
||||
CVE-2022-32473,0,1,e8b5705ff0cef9c3e9d1de69fcf6929ba81d5b69e063be424e163e459413e796,2025-03-20T14:15:15.110000
|
||||
CVE-2022-32474,0,1,1eb9e81134fd4ff84f193fd1e8144620a005cfade254b8d61135fec2dd6f49db,2025-03-20T14:15:15.290000
|
||||
CVE-2022-32475,0,0,f347cbd24aedaedf7e5e97450c28482a05994447dac6e58fc9e721b827f19f22,2024-11-21T07:06:24.297000
|
||||
CVE-2022-32476,0,0,3af25dc3b2102c8c104dc3df29ca7a72e195bad746eeb73446397b5ee82f2702,2024-11-21T07:06:24.440000
|
||||
CVE-2022-32476,0,1,7733fed2ca72a00da85d4c4427e20f070da15445367355e4fe84148f951560df,2025-03-20T14:15:15.457000
|
||||
CVE-2022-32477,0,0,26582c00ca030080289a837743c442fc7b082d9d1ae1beba6237a39c060639a0,2024-11-21T07:06:24.597000
|
||||
CVE-2022-32478,0,0,2edc523937d4238ad6a7033de23edd0bc3edd1028bf8474b8a52e10133b25393,2025-03-19T20:15:16.767000
|
||||
CVE-2022-32479,0,0,bc3ac35450c3f850d6754078b7ff1cde8053f41b1972c00559e5461f02215b17,2023-11-07T03:47:49.050000
|
||||
@ -201119,7 +201119,7 @@ CVE-2022-3295,0,0,b97e1ae160e5e6c4d12e7c64825d054c28a200bb0bc5c2fb1af1a735e1cd9d
|
||||
CVE-2022-32951,0,0,b96d61791b8207aaf07580a98b54dcd97a93e82ecebe71b19053d4f65d07fce8,2023-11-07T03:48:16.567000
|
||||
CVE-2022-32952,0,0,4c65f44edddbaa0ec60369afda8c5dbb5ddac1da0a1d1cb299bd11c8899ef8ac,2023-11-07T03:48:16.603000
|
||||
CVE-2022-32953,0,0,c62d3f56ff4ce118c5b18b3a469b79ce65ccee49a64a75ba1e5c875aa948aecc,2024-11-21T07:07:18.110000
|
||||
CVE-2022-32954,0,0,a8b806a7b1fa962e491484caa94f03dea177963b1fab003c2ed269138806210c,2024-11-21T07:07:18.293000
|
||||
CVE-2022-32954,0,1,e938d38e326df3737cb506ff3eb44451f90c7050d6b4d91b231b3ce99496880b,2025-03-20T14:15:15.620000
|
||||
CVE-2022-32955,0,0,693c88d6807ab13b185285fe7d3b8e6e33b50d24efe71c4b44c01709554d1378,2025-03-19T19:15:38.053000
|
||||
CVE-2022-32958,0,0,30b036a3c66fa5e660306ddc71576785c2e81d2ced310ce080bd26ed9b2a04d5,2024-11-21T07:07:18.650000
|
||||
CVE-2022-32959,0,0,2dd9decbfaaeb3b2c4f44c2ff7a9ae87816fbc6481e6d0c22e0b463d32f2adc4,2024-11-21T07:07:18.783000
|
||||
@ -218286,7 +218286,7 @@ CVE-2023-22685,0,0,872ccca0a995fcbc9b6dbbf87810e17f5f81532bcf8234628f40a332f9626
|
||||
CVE-2023-22686,0,0,7c9bf339bf7fc40f4c831a9ed1d17e389cbec2dc16f86171fe02873df21e717b,2024-11-21T07:45:13.160000
|
||||
CVE-2023-22687,0,0,481cbe6c9b0605fead448c460fd46c38a58dc6fe3130c96ddf61521c09d6ba9b,2024-11-21T07:45:13.287000
|
||||
CVE-2023-22688,0,0,4720f580d23e9d419d3fb86a17b61f9c43e7cc6572c25842500edd17e7c7def3,2024-11-21T07:45:13.417000
|
||||
CVE-2023-22689,0,0,3ff59f61eb029e7bd4a09f892c67b53b6c6051136f304c3b1ad55713dc58bfb7,2024-11-21T07:45:13.570000
|
||||
CVE-2023-22689,0,1,29b8a1f87cb9f79ba677ca25bbf169a87d855b6fc7bdcb850202db45024e3588,2025-03-20T13:40:53.910000
|
||||
CVE-2023-2269,0,0,6ca8e1183b79cce7a84a5a2b205698fe6f39669423122d7d423e82771025e168,2024-11-21T07:58:16.757000
|
||||
CVE-2023-22690,0,0,f5a98f075c8ec8ddcb94c0fcc4876644f7035641e7aad29d34ee4d7180049a46,2024-11-21T07:45:13.693000
|
||||
CVE-2023-22691,0,0,a6c8807e24a32130a152a50313e40a65feca610572cd7d2c96862f03c2c322fc,2024-11-21T07:45:13.830000
|
||||
@ -220952,7 +220952,7 @@ CVE-2023-2597,0,0,303cc785566dc8801b26b54d7ade491ff996c6bc976f3b826f6eff26020c8f
|
||||
CVE-2023-25970,0,0,66a9b5160d597cae25abfa85015b5c46fb9880077debecb72756aa1603db4a18,2024-11-21T07:50:32.340000
|
||||
CVE-2023-25971,0,0,7910cc6bfa020687fef42cd75fb4d114b8e7fad8b5dae120ce405a57ad72823c,2024-11-21T07:50:32.460000
|
||||
CVE-2023-25972,0,0,205b8e854e216e06024630ebbb65d54b9102029592a6a8ec7be0a14c17d4f78b,2024-11-21T07:50:32.580000
|
||||
CVE-2023-25973,0,0,ec0f9b626f3821e4a44ecf324bd9f717ced1aee03075cfe1b8ab7fab1fefe7c9,2024-11-21T07:50:32.697000
|
||||
CVE-2023-25973,0,1,9a80b0494c036758b2f5dab3ea64f62fba360e078a51deace3377b2cda97f0ec,2025-03-20T13:40:53.910000
|
||||
CVE-2023-25974,0,0,168fc4aa4bc93a9721d87ba6d2a9a66d3ece62fe4482f804491661e1edf26ea5,2024-11-21T07:50:32.813000
|
||||
CVE-2023-25975,0,0,7c4a31e726261533f8c0d14cb17a6373ae394a0fdf228a164c5b94ffe6cd748d,2024-11-21T07:50:32.933000
|
||||
CVE-2023-25976,0,0,cafa65c359e1391fb894a0c4e81f1b1bff303a3af6667d59c0f2c74fb3d3faba,2024-11-21T07:50:33.057000
|
||||
@ -229535,7 +229535,7 @@ CVE-2023-3703,0,0,e793c1538a953443cfd9717dd4892eed9653e7e0e15a19f28233b00c03531b
|
||||
CVE-2023-37030,0,0,ebdcd8b44b26b10615d4d1e02a10d45b81fef97c218d1a1e3ae11fd5af3bc011,2025-02-18T21:15:17.930000
|
||||
CVE-2023-37031,0,0,eecae8436c125fb0507991527939e1452a167178a727a6215db684c9b09aaf64,2025-03-19T15:15:45.317000
|
||||
CVE-2023-37032,0,0,f11742d5ae1a08ddfd444a3b3ee04f576db30c7522f8bb7a3002ad6d4bda7e7f,2025-03-13T15:15:38.560000
|
||||
CVE-2023-37033,0,0,4d19abd7a4b0679c963f8ae0666794b729ae8b36c669ea355e198e5d10e5d131,2025-02-18T21:15:18.477000
|
||||
CVE-2023-37033,0,1,2fd5f206e7c8f088db0d3fc2bc827aaccccf526fdc813bbfc30e1fdbc2c06cb2,2025-03-20T14:15:15.920000
|
||||
CVE-2023-37034,0,0,fa5a5e09d8d78e10a9175b15b4767670b021a7f2fdabb4036e210e9d3e979a0d,2025-02-18T21:15:18.657000
|
||||
CVE-2023-37035,0,0,6fd1f0fcf8e0fd7b5fff245ed675e79d0e28b5c9d56b589ad47f9b27426f565f,2025-01-22T15:15:12.017000
|
||||
CVE-2023-37036,0,0,9cb7eec923454cc934c4e4af05d1ed6354e2551d5bb10e0d0a66295f750bcabc,2025-03-18T21:15:23.263000
|
||||
@ -237569,7 +237569,7 @@ CVE-2023-47649,0,0,c7e7f5d23f04acb7bb0c8db6a070a50c654b6ed83b956e13cab0275ad6bd9
|
||||
CVE-2023-4765,0,0,82de4b951e877ffe7754c475b16820a7975c6670692f96883ac367a32ac7d2e0,2025-02-11T02:15:32.333000
|
||||
CVE-2023-47650,0,0,7721feed13fbafec3d98f106931e00bf3d20b125d30ffae4b9aab5026cd107f3,2024-11-21T08:30:36.170000
|
||||
CVE-2023-47651,0,0,de674ae82fb6a8f5100c7c6af15e148c09dd930edc5e1b0d5a3257e845a858c9,2024-11-21T08:30:36.307000
|
||||
CVE-2023-47652,0,0,b432b17ca99883bc3a83adf664f57aeb7d3fc633a8f9f19675ed8e65d3795331,2024-11-21T08:30:36.437000
|
||||
CVE-2023-47652,0,1,b9cf8591e03a7a34286216df6003517e12f794b17a220e694765e80aa0a7487d,2025-03-20T13:40:53.910000
|
||||
CVE-2023-47653,0,0,4bc3f5acb8f4810e71e1b67b4905e480b7a2fbd28307d497def6a1b6d10deff3,2024-11-21T08:30:36.580000
|
||||
CVE-2023-47654,0,0,ca8cb44eb20061a81d7a62b29021e3974bb631603d9ae9c1f18c087ba86ab6db,2024-11-21T08:30:36.707000
|
||||
CVE-2023-47655,0,0,d71909537a63f986168d6cdf6ef653287378eac8cbf9b85662b441cdc6f261f4,2024-11-21T08:30:36.840000
|
||||
@ -238616,7 +238616,7 @@ CVE-2023-4897,0,0,07a390e0b63403258ae68e36ca13ea1f5f83204b2e2ad36e8736ce5043b694
|
||||
CVE-2023-48974,0,0,8fd80981b6b21363b2c4bb0350b210e5fbf55f8e3bcfa62fc878d4564d44651a,2024-11-21T08:32:40.597000
|
||||
CVE-2023-4898,0,0,f47d5fad93de142b0e520dbe68d4d69341d7e4d308a26e168d2cf20373685375,2024-11-21T08:36:12.940000
|
||||
CVE-2023-48985,0,0,6085ceaceb9bc984350ad484b7164b84ca1f82a570dc5327d198eae93291cec3,2025-03-19T15:15:45.800000
|
||||
CVE-2023-48986,0,0,b6642d6a02bf7a36efe0c0d0964874e657d44228d14182cb9a09a950da3586de,2024-11-21T08:32:40.900000
|
||||
CVE-2023-48986,0,1,ff6e6738309e970dc01f18950378d453c2d15ac175ea278c464f5c9442a4fb5e,2025-03-20T14:15:16.100000
|
||||
CVE-2023-48987,0,0,9988be02e62a3cc4a20eafae255b02df819814a492d95e22f08a4a3ceac2efad,2024-11-21T08:32:41.043000
|
||||
CVE-2023-4899,0,0,ede3b5079c9b4e13d28ee7fd1470b2c72985e07c6c2938b7732e6f2bee3794de,2024-11-21T08:36:13.090000
|
||||
CVE-2023-4900,0,0,225291a89e15b2f07d8db07d435c2b51ee210c127585c386c11dc3032bdd8db8,2024-11-21T08:36:13.220000
|
||||
@ -240966,7 +240966,7 @@ CVE-2023-52337,0,0,5d30b2e795d30af25a7c2557afed1bcb45315c4a68f523353a17c18460ac4
|
||||
CVE-2023-52338,0,0,a8379d6b9439ab072316828f426542121a26cdd77617df5ce049082cb5dd92bc,2024-11-21T08:39:35.220000
|
||||
CVE-2023-52339,0,0,04761042913417f175a1a950ef091900c9ab04b11919416fb9f6dffff092dad0,2025-01-20T16:15:26.810000
|
||||
CVE-2023-5234,0,0,34ae66ee7e63a40a6738f609f4441922874dea20b90ef26d372e887f99364913,2024-11-21T08:41:20.707000
|
||||
CVE-2023-52340,0,0,16eca95031fee7fde4bdad98ceb95fbda1723b4f4f2983c267308bdc0d0be681,2024-11-21T08:39:35.620000
|
||||
CVE-2023-52340,0,1,deff60fd9465872fca8415ca30597c56609c0ba54b1de7107753f9a60f5d550e,2025-03-20T14:15:16.297000
|
||||
CVE-2023-52341,0,0,e7838a8d40adca16ce439d9d4cd7f7d9f467e44ba90e1764b762e3f00bcb077e,2024-11-21T08:39:35.793000
|
||||
CVE-2023-52342,0,0,2b80762e19161f4631043894e7b978dc8ed7e80c1130c4208a06234b6c9f6c81,2025-03-13T18:15:36.080000
|
||||
CVE-2023-52343,0,0,50fc46a3183b956d98ba63103ec255ffda4f0f179dfae31fd51d68f594a6ed6b,2024-11-21T08:39:36.153000
|
||||
@ -244130,7 +244130,7 @@ CVE-2024-0758,0,0,e2cbb6a743b0f38d8763d67905dd1888ec1c82e9f64e59374dd3f997e1e4d7
|
||||
CVE-2024-0759,0,0,3291189ba10b6e31f6abb12e4b6b5344b2e6c89d09b1acc284f3852e5866c461,2025-03-04T14:34:52.510000
|
||||
CVE-2024-0760,0,0,28b1688290a8429996cb15aa4a590dfc852aa2c256b386e9997c92991939332f,2024-11-21T08:47:18.850000
|
||||
CVE-2024-0761,0,0,3880824002a244098dc4a9d203545fa3dda9ea94020902bbdff8af939e9833c7,2024-11-21T08:47:18.990000
|
||||
CVE-2024-0762,0,0,5a9bbb31c63619e68757e176832f3d110d2b2f096fdea8e0bdfb5fcf207ee1e8,2025-02-13T18:16:15.227000
|
||||
CVE-2024-0762,0,1,55ce0ccbbb179304c2f94ca58c87f5c89024696b56a67d10de02a4397359f1e2,2025-03-20T14:15:16.470000
|
||||
CVE-2024-0763,0,0,957929b8ceeada74ee3df21edbba0614c080aaf40407f4c5d2f09db451c946d5,2025-03-04T14:33:46.043000
|
||||
CVE-2024-0765,0,0,bd1e10ec0269235d1f805b41ab6a7621e35014767ca84eee6da95b2930039ff6,2025-01-08T14:32:04.447000
|
||||
CVE-2024-0766,0,0,8d8b47eb35ac4fbeaf262a06f0eddbbba34c1a2755f916cda469cbece9f642de,2025-01-08T18:43:16.317000
|
||||
@ -244966,7 +244966,7 @@ CVE-2024-10647,0,0,05b3aabb4778e43bb6f2ea80f3d833ac24d1ab3b06ce7337c8de9fe67f9f7
|
||||
CVE-2024-10648,0,0,a05a6be89cd5db2c6ede471802599c3d634f5ff594efb32e61244c2e5b9c45ec,2025-03-20T10:15:18.010000
|
||||
CVE-2024-10649,0,0,db16dd80e8448f6d889f81db31b520a6b745a5c4498a8d0f77b2517fc8d93990,2025-02-11T00:15:27.680000
|
||||
CVE-2024-1065,0,0,b15b37df186076da575ae1588759c677f2677d06b5081dbb99648fc8d071921c,2024-11-21T08:49:42.970000
|
||||
CVE-2024-10650,0,0,c30c9c18bcaa36d607709f3a80d251fb20966bfb818732651634048085cce74d,2025-03-20T10:15:18.150000
|
||||
CVE-2024-10650,0,1,77bff52f21ca238d1f8f91b0d45143061d53ba53b01369ec7af36a0b22b002ca,2025-03-20T13:15:35.600000
|
||||
CVE-2024-10651,0,0,daa7d277426e3cae52065dc92f7f81ece792840b77223c8e793cafff956732fc,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10652,0,0,ac6a1cb285fa9430a30ef765efb81818d01030d7912dcbc5a6b350b902530b17,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10653,0,0,f703737b2cc08f11753db75c9b1433d1a44f113e4bd6d601b3a10301d1952eb0,2024-11-04T07:15:03.743000
|
||||
@ -245039,7 +245039,7 @@ CVE-2024-10718,0,0,471b4fa7cc1669e00316ed179dba9d8b8921603884a11bf6ae5c8c3b4cff7
|
||||
CVE-2024-10719,0,0,c04fe810dc8b6dbc4ff8e085af60f5b095bd560727435ed51dd992dcf85670aa,2025-03-20T10:15:18.770000
|
||||
CVE-2024-1072,0,0,072588b3ad9799dd1be77562cbf99842d770c415df8f6c79982601d36efe8be1,2024-11-21T08:49:44.053000
|
||||
CVE-2024-10720,0,0,03957e3ae8f629c8b8a9fe1b882de295221e90f8be6d9a179a1c5c0fc4d274f6,2025-03-20T10:15:18.897000
|
||||
CVE-2024-10721,0,0,7513ebf7720c24a981ff91146c74faa6c208fa415465b8f98a8613aa9aed98f4,2025-03-20T10:15:19.020000
|
||||
CVE-2024-10721,0,1,73dafbbe3566bebf695355acbb63f3bf3c3fb0510d7e5b32873e00345ce9fb22,2025-03-20T14:15:16.777000
|
||||
CVE-2024-10722,0,0,75d597dda4b619bec036412cfe8477654ca04807f11e9662ef3244ad9e9ad9e4,2025-03-20T10:15:19.140000
|
||||
CVE-2024-10723,0,0,ecff2dc65a0f6afdaf2ea72c163ce019cee4c723a4230d26b8e5d67a3b135c94,2025-03-20T10:15:19.267000
|
||||
CVE-2024-10724,0,0,05e42846a0ca7a29b96a4920596f6e84fd10807d888aa6bfb57f5b19ec5ac8b0,2025-03-20T10:15:19.390000
|
||||
@ -245271,7 +245271,7 @@ CVE-2024-10944,0,0,8a1f4f1607ad9d6e7b50d018d12daba2da0f99b7a46a7adc3175cffe9e914
|
||||
CVE-2024-10945,0,0,4565a68d7b071de3f68b554bb0e3622ada92ff53d622e5bbe9a67361142f853d,2024-11-13T17:01:58.603000
|
||||
CVE-2024-10946,0,0,53aaa4c2b70ab58f1f9d341ec26db4c320c92302ea6be8ed93f351ac560eec4e,2024-12-11T19:58:39.510000
|
||||
CVE-2024-10947,0,0,2aae773bfbf60ac21159d9a05dedf7441ef54fc905f7b5caf5816c76b8e3b650,2024-12-11T19:58:55.657000
|
||||
CVE-2024-10948,0,0,5da1838054600415ddc45cf84fa10da6b3f0c19ecd75a3d31418ebc6299c31e8,2025-03-20T10:15:21.977000
|
||||
CVE-2024-10948,0,1,adb376624a7cf66fd05776fc724a26103986654bb75db4bcef6ded5ff6e66046,2025-03-20T14:15:16.890000
|
||||
CVE-2024-1095,0,0,29b5dd0a49491661933e0a95304e4dbb1f8171cb3aa4fee685f9a9d003fadf18,2025-01-08T18:05:01.880000
|
||||
CVE-2024-10950,0,0,a49330f469040470a2e68e7dca50ec016c06d85974baecccc3cfe478c6333288,2025-03-20T10:15:22.110000
|
||||
CVE-2024-10952,0,0,edff8b29d26accda4a8e33f169e18ac16231b4d8b9445539c32344bf5f44c6f1,2024-12-04T03:15:04.593000
|
||||
@ -245349,7 +245349,7 @@ CVE-2024-11026,0,0,319f686d9e1816aec56a50d3ae71f2580939b84056c0eacccd7bc237a6bd6
|
||||
CVE-2024-11028,0,0,be5701b1791efbf2de8ae4ea20b2a6d8d846ef340e5e6b5f9a4b779b0ccd543b,2024-11-19T15:38:19.023000
|
||||
CVE-2024-11029,0,0,2078f199f9bbf1398258d7e80b5e210fc7e6e45920bcdb55b83dc78fb62abd04,2025-01-15T14:15:27.683000
|
||||
CVE-2024-1103,0,0,67facb6d0111ac9feaedb0e1ff15fb0365b23c4e06ac8bf95d1880d6a65dec1e,2024-11-21T08:49:48.223000
|
||||
CVE-2024-11030,0,0,2c08a0d77f3e6580b416ae36cdcba88aba35fa92609bf530cdfe3720da0ac526,2025-03-20T10:15:22.707000
|
||||
CVE-2024-11030,0,1,e22bde1bccf5ccf171d8d41d08527bdc5f4a1d8a2258749a18d2cf9693edbe13,2025-03-20T14:15:17.473000
|
||||
CVE-2024-11031,0,0,1d6846e36ddf44552bfa6e382494bfbde76c74ba805427b0abaa7e8cbc9c358c,2025-03-20T10:15:22.820000
|
||||
CVE-2024-11032,0,0,193d7f15f7d6fb6acc69100150013c956a0f9f1c2928bed67c10b42c014fff09,2024-11-26T10:15:04.343000
|
||||
CVE-2024-11033,0,0,65e4e7043efc2676a8643f6070836596d2650f777700d01fc38fceb11e862284,2025-03-20T10:15:22.933000
|
||||
@ -245363,7 +245363,7 @@ CVE-2024-1104,0,0,1eae50c75d8d746ca0f746c7f8113a7b95b6cc5ee3b09f81f9dcc34a01c59d
|
||||
CVE-2024-11040,0,0,8b13cc9e47c81a96290f64b2c0309df8dbf9424da30e8bf7511077ca38e1505f,2025-03-20T10:15:23.293000
|
||||
CVE-2024-11041,0,0,68a295fd23cab6723e3189d2e76114225e59f434d4539875d52585e934a8db5e,2025-03-20T10:15:23.420000
|
||||
CVE-2024-11042,0,0,b88cd11b9ecaace4853df81a84789a1a711dd4cc5f393e37371e9cc85fda4502,2025-03-20T10:15:23.537000
|
||||
CVE-2024-11043,0,0,e90416adf78bf09b58ea912a0ae1dcdf8991edb07a19821d23a3ac3c72597995,2025-03-20T10:15:23.647000
|
||||
CVE-2024-11043,0,1,bfd559aea1d5c03a1a0f076104c04fc7c4b64debc74dfbefccd0f223a56b60de,2025-03-20T14:15:17.980000
|
||||
CVE-2024-11044,0,0,a29377d36f2055bee88b0c5232b43dc6a73808da1a7a6f38b170179e8bd122ae,2025-03-20T10:15:23.760000
|
||||
CVE-2024-11045,0,0,29d4730137acc780255ee0ee0ff1e2dc8e1d4b225a5bb25f23247bdd74a0e237,2025-03-20T10:15:23.873000
|
||||
CVE-2024-11046,0,0,5c40c6f1651a9b03786d792eb7bb9f10db2b0751ebb511e24aebc51063c62960,2024-11-13T21:01:01.540000
|
||||
@ -246144,7 +246144,7 @@ CVE-2024-11819,0,0,dd67ccea77b2010a5d3d3bed5462831e3e8fec0490eb54f93b917418104ab
|
||||
CVE-2024-1182,0,0,3f29301d892b117e83ef161f22ec91ec635f3f594205a460782ee4e3d4d8572d,2024-11-21T08:49:58.813000
|
||||
CVE-2024-11820,0,0,c9acd90582cf424c9a1b2cf3b88b21321cb2671879d30ced0b2d8e6eadbad791,2024-12-03T14:54:20.297000
|
||||
CVE-2024-11821,0,0,d79dffda93e49a9a33febb11aa40df2aaa539c52fb76cf365663607e1927d4bb,2025-03-20T10:15:25.563000
|
||||
CVE-2024-11822,0,0,e4e56a4af27cbaa6f01e96915e401dcd006d0658b960d2f25ef467ac49762952,2025-03-20T10:15:25.677000
|
||||
CVE-2024-11822,0,1,f3a4368e15a0dafa3db36565b3175a7245d5a4d4570851eebc7954d5aeecae70,2025-03-20T14:15:18.070000
|
||||
CVE-2024-11823,0,0,c06b322c55c56e39da841e24dcfc245d4bbf700dd82f0350363e4100fb063133,2024-12-06T09:15:07.463000
|
||||
CVE-2024-11824,0,0,4aeb80b755dad854b25eb862e4da6daf10d0774bc7c9a780f61a15f345fa9419,2025-03-20T10:15:25.790000
|
||||
CVE-2024-11825,0,0,3be30804a10b7dfb26944bae19d497d5419e7b2419af9e6f32f50fc204320423,2025-01-25T08:15:07.190000
|
||||
@ -246367,7 +246367,7 @@ CVE-2024-12044,0,0,1763d71d0ab0d1436bd63b72aeb76acc4421b3fb699671be87b9b46e8fbf8
|
||||
CVE-2024-12045,0,0,129733e1a8172f1173193ada9167ebfa92abcbaf9c1c22ab7b433d2b7a56ea29,2025-01-08T08:15:24.683000
|
||||
CVE-2024-12046,0,0,b1c5edbe1744b4677b76c567c6df32419a96f24a9c141c0fb388cffd7e9f48a8,2025-02-04T08:15:28.583000
|
||||
CVE-2024-12047,0,0,8440f971596bd55cff74a4ca413c1e3de197b2701820ea36a0544bdffdfe4e47,2025-01-04T08:15:06.157000
|
||||
CVE-2024-12048,0,0,32c4671a4d44f51cde43ba6c73e7b0d1a67e63b5239f0c3c7f6e15c4197c5226,2025-03-20T10:15:26.503000
|
||||
CVE-2024-12048,0,1,4c94c1b74f74a69df937c57733fcebb1882f61c5c5423ac65d10e7d72d28df82,2025-03-20T13:15:35.717000
|
||||
CVE-2024-12049,0,0,42e54420720f33c4562344743dcb6a33224d938ded42006d07df2fa0d0a23306,2025-01-07T05:15:14.147000
|
||||
CVE-2024-1205,0,0,3af139dba35612113ff8da60cc03a47608ca20df5be305deccf880cb74bc0a7c,2024-11-21T08:50:02.210000
|
||||
CVE-2024-12053,0,0,bc2b289301180bd6933809c4de004e58bcafd2b88fa0501ccb1750c43496ee92,2025-01-02T17:47:20.023000
|
||||
@ -246389,7 +246389,7 @@ CVE-2024-12067,0,0,1e92db34fdb6070fa741c6f0fc31b2e9eacb1c54540470e816605dc679b61
|
||||
CVE-2024-12068,0,0,6ee33f8fc5b7a5a6de0d0bc1e83b1b07cc946797fe443eca4c336654817ea14b,2025-03-20T10:15:27
|
||||
CVE-2024-12069,0,0,f94a20479dd7fc27deb35539ef9ad19d1d5d3c28061855d7b2b325c5b3dd01a4,2025-02-19T08:15:13.470000
|
||||
CVE-2024-1207,0,0,7ca2a33c54192dfcfa7fe7f99bed16fbfa1215b4ac8ba5de485b890ce26af06c,2024-11-21T08:50:02.457000
|
||||
CVE-2024-12070,0,0,d8edd582b2d81b026cff03b12b9714b99dd1fe901b729d4494083a9d50976673,2025-03-20T10:15:27.110000
|
||||
CVE-2024-12070,0,1,249e3a318cc7495f22af0e12aea95021a71aae8eb6d1ac8f58c927284c0fc895,2025-03-20T14:15:18.200000
|
||||
CVE-2024-12071,0,0,6dff9450f26991acd5af96541be6b0bb32cb8aef7b4a9e76db555589dde6ae01,2025-02-25T22:17:41.733000
|
||||
CVE-2024-12072,0,0,a174c14ab62255e805373ea4d76cdd13bc3d9cbde3ba4a3927979f9e7d419d41,2024-12-12T06:15:23.383000
|
||||
CVE-2024-12073,0,0,d6db2f0c4889187ac33654deef83fc5d0350b2e32b900f5fdab17885bff03ab5,2025-01-07T06:15:15.367000
|
||||
@ -246699,7 +246699,7 @@ CVE-2024-12383,0,0,19d74999b8b2bcff68543eb20d97d9dc601a395c1ae1c74bde3b1e01160ff
|
||||
CVE-2024-12384,0,0,f1312e19de6c9643af9162852b5499e7f57a4620a6ff1aef3fac1b374cc11e84,2025-01-07T06:15:15.983000
|
||||
CVE-2024-12385,0,0,342a63349668411d87230687329448ecea14fcfd2e7b116a488b8380d0becc08,2025-02-25T22:01:07.893000
|
||||
CVE-2024-12386,0,0,5fc1e01f5e9fd108b16f7e2ffa29cb9e004d42ac5dc30102bf32ad04864ac122,2025-02-20T16:29:39.023000
|
||||
CVE-2024-12387,0,0,751f11e8683c39599f086fe88231ba9def583a79ab6c3b15893e492b057709d1,2025-03-20T10:15:28.010000
|
||||
CVE-2024-12387,0,1,559fc19803e6b1c11957758daac5902387dbe94f5a6a47b3aaa54f9f242d7daf,2025-03-20T13:15:35.803000
|
||||
CVE-2024-12388,0,0,c416a78bbdce1ccf072ffecc249411d14bbc6fc43f4710f69a556520fb5039c8,2025-03-20T10:15:28.127000
|
||||
CVE-2024-12389,0,0,7bfda5dd8bf178dfd9258187ab965f12fb98cd75efd5f9afc7931dd0b987abf7,2025-03-20T10:15:28.247000
|
||||
CVE-2024-1239,0,0,e372911200db947b5d23f4c5c4ab976b80519731ada570ba51a10f8cbec0919a,2025-01-17T18:34:30.327000
|
||||
@ -247018,7 +247018,7 @@ CVE-2024-12715,0,0,c108391047bdc5cb3a30ab729c489c01e29510a155fea37302079b85e271c
|
||||
CVE-2024-12717,0,0,6474accd48577f4efdbde77f72937b508282b403c332108a28e333766275acd1,2025-01-09T15:15:14.493000
|
||||
CVE-2024-12719,0,0,c34442f4a2a9e42bf0beba4200827e8cdf35e75eae83c71d20db9392843712f7,2025-03-13T17:23:01.420000
|
||||
CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000
|
||||
CVE-2024-12720,0,0,53f9b8af7483ba6c6de53c6d8046996136c7966551088d60063a392bcea587a5,2025-03-20T10:15:29.507000
|
||||
CVE-2024-12720,0,1,afcc6743f43da73c7e5bcea40a3b45c409f5b401c1620b5eefaedc4ac7d24bc5,2025-03-20T14:15:18.290000
|
||||
CVE-2024-12721,0,0,571985a740d2928fc1a87564f0c06d43223a7710e7c693ff83d0481daf31f163,2025-03-01T01:19:03.923000
|
||||
CVE-2024-12723,0,0,a363ae7e16743f7d59f6caa0400a8b56a1d7cad2c81899b31cbba1d46f30e521,2025-01-28T16:15:37.430000
|
||||
CVE-2024-12727,0,0,b783145694badccf248249bee0c82f1aff0f923b8a3e56851318776364e6e057,2024-12-19T21:15:07.740000
|
||||
@ -247053,7 +247053,7 @@ CVE-2024-12761,0,0,c81748a3b23c8ecd59e75d1e60fcfd8c0ad9dc35e8aaa3c1a185d074f4b9c
|
||||
CVE-2024-12763,0,0,828b2bb544f2e61dd11f51daf4dde3c9326c6a38ab958bf084c901608bda161f,2025-02-11T02:15:33.770000
|
||||
CVE-2024-12764,0,0,520ef7a415b759131cb40460656f8f00fedd52ee179d3018b43ad66d1c2ea33c,2025-02-11T02:15:33.817000
|
||||
CVE-2024-12765,0,0,f7917c17906425e707a3ca48a19a2a85665883890f2e41423afe14a68f13711c,2025-02-11T02:15:33.873000
|
||||
CVE-2024-12766,0,0,998fedba3b63bf35833f7a807e09dc95f13213431ff447040ac3053b529d7fd6,2025-03-20T10:15:30
|
||||
CVE-2024-12766,0,1,c2b2fcd06fe066782990daf99981cb5d47fca68e085099612d99d57a4caa3135,2025-03-20T14:15:18.387000
|
||||
CVE-2024-12768,0,0,9cdda843811199bf9b0e0359033a7a04598a7735ac6f0240aa5e3d0298e2cb55,2025-02-04T21:15:25.547000
|
||||
CVE-2024-1277,0,0,1a185a3e5546740a0eacb8b77e1cad6738d582479b658b08c14e8d4535b09c19,2025-03-04T12:34:06.490000
|
||||
CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000
|
||||
@ -247062,9 +247062,9 @@ CVE-2024-12773,0,0,4a158210ce8f04e63a0cc5644404dce0edf638a1d39d2ff2dbf8f403280ec
|
||||
CVE-2024-12774,0,0,a5018f9b8a1ed4e5ce72ea8a47b3a7028c7d128473c99e738a64f122822c050a,2025-01-27T15:15:09.803000
|
||||
CVE-2024-12775,0,0,353eef92526ca7897538186dad37cf3e2c9371576897d9e3e65be91cfe054a05,2025-03-20T10:15:30.117000
|
||||
CVE-2024-12776,0,0,335310c748d3c51ab78623da567c82ac049b4795c46a63042cd1ce31c6efba22,2025-03-20T10:15:30.233000
|
||||
CVE-2024-12777,0,0,9600c15f4787daf3d7e8d5b3bdae4d99afeeb72660544a068197fc5e62ee2af1,2025-03-20T10:15:30.360000
|
||||
CVE-2024-12777,0,1,2a75429bf1556da3d9bde0b6a7673fe4d81179906be2c68ecd81596d5117b3ab,2025-03-20T14:15:18.477000
|
||||
CVE-2024-12778,0,0,97b301d0557555b8b29d6efcb16d63309627e08a8d926b4cd0e1322bb8b74edc,2025-03-20T10:15:30.480000
|
||||
CVE-2024-12779,0,0,dc2cd6614b64130e890c9d0da7610befd983e94baae69c31ab3e3e6ce4e31f17,2025-03-20T10:15:30.600000
|
||||
CVE-2024-12779,0,1,e73d36814eb850ede336368813209cabfd3b643e441d15ba7fb97cc81716e6b3,2025-03-20T13:15:35.893000
|
||||
CVE-2024-1278,0,0,5fc68c762fc836b6c12a71eed788de7c0888610c449a9d12f31cc3647bf88af1,2025-01-29T16:26:48.717000
|
||||
CVE-2024-12781,0,0,c74d8fa49d4e1ce3b752d35981d8b052a93e3f1d0fb27ff932f88f085f9b3bc6,2025-01-07T07:15:27.937000
|
||||
CVE-2024-12782,0,0,d2e881814d729c9fad0c1c1a3b56268648b9ca7902e0e86e7f1cea35a422381d,2025-02-28T07:15:33.487000
|
||||
@ -247152,7 +247152,7 @@ CVE-2024-12868,0,0,2e8524ce0841a71c6f8373377e9f86198016031006174e683529a9875c929
|
||||
CVE-2024-12869,0,0,aa8f4ee3bd46ae3afa4f0a4ac3aff84e433218a2993cf4412ad0147b1172e52f,2025-03-20T10:15:31.087000
|
||||
CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8b0,2024-11-21T08:50:14.227000
|
||||
CVE-2024-12870,0,0,3affaec53ee6e1a3ba719e479603aaf5325388bdfdab80e6d3cae266e421d442,2025-03-20T10:15:31.210000
|
||||
CVE-2024-12871,0,0,7e4226d4844e39200f11a6ae8f8c6a12a37a759f5120de48620eea7f60a2664e,2025-03-20T10:15:31.340000
|
||||
CVE-2024-12871,0,1,606489a75c81ea9701e0f209ad88ca508a7c6861f8d93010e1813d2dc1d64578,2025-03-20T14:15:18.563000
|
||||
CVE-2024-12872,0,0,ef2adea83c4dcced92604feb28ab9bdd7144986700cdccc2c5054cc997ad5b7c,2025-01-31T17:15:12.103000
|
||||
CVE-2024-12875,0,0,87b0956586183e5c613030d4ef29fd959e1646cc803bd99da499c5b331518d7b,2025-02-07T17:09:37.010000
|
||||
CVE-2024-12876,0,0,df6c47419287a2c5f9f4bb7f039a7f40cceb279ba47f8e2dcabb382c988f8110,2025-03-13T17:55:17.550000
|
||||
@ -247188,7 +247188,7 @@ CVE-2024-12907,0,0,888eb59eb672b880a00352690cbd4fe68b3b4bda1cea5583ad3fabfdc05fe
|
||||
CVE-2024-12908,0,0,76a88b8500008d4ca56b5c37bddceec64b40a69d8577b8cdbf6118a2030881b4,2024-12-27T15:15:10.240000
|
||||
CVE-2024-12909,0,0,ad4fbd2e0fe9021f8d8fcc9a800c89cd27435db419cda5d58cdea799afd336e2,2025-03-20T10:15:31.833000
|
||||
CVE-2024-1291,0,0,8f051cca86e07e915f10677720017dd69f0d69620ffe64fe34f7d04e63b0eedf,2025-01-16T15:28:37.230000
|
||||
CVE-2024-12910,0,0,af7609d4b01760127697b41fa5814a8fcf024d73a2dee81f22b94ac886fdf2e3,2025-03-20T10:15:31.960000
|
||||
CVE-2024-12910,0,1,c8a26a020ff21d43e0b83b1f7da473e0f2b977d034cd265dc7a6e856377f6201,2025-03-20T14:15:18.657000
|
||||
CVE-2024-12911,0,0,15d1ff1ec084bea49dbd26f2da3a2e838ec9a7e3686259b97d6544753fb97fa3,2025-03-20T10:15:32.083000
|
||||
CVE-2024-12912,0,0,746e63a7cfb944606513a06821763c045edbf693309ba8391961cb9c8e0e7197,2025-01-02T09:15:17.470000
|
||||
CVE-2024-12916,0,0,873646360c9afa8537809b46bfbaa012067b822ad3f15631982e23d8da02b918,2025-02-24T15:15:12.240000
|
||||
@ -247833,7 +247833,7 @@ CVE-2024-13552,0,0,727d2501f561c703e4b830bea73318d02ecb82132ce891ff47b177cb8690d
|
||||
CVE-2024-13554,0,0,7c6792ed304320bad6afd2ef20fd307ba91eff7957375903da0bd819567a9045,2025-02-25T03:52:20.300000
|
||||
CVE-2024-13555,0,0,49b73d745edef53131648713ff0454df654c61bc1fe448679f0e83788ee99801,2025-02-24T14:54:29.683000
|
||||
CVE-2024-13556,0,0,227f79da3d8af7739955eed8b3ebf27bbbf505836c230601eee8e2a82464e9ab,2025-02-21T15:41:41.720000
|
||||
CVE-2024-13558,1,1,198540feb6d32f5c06397e557b4130a53b6cd8d868bbd03ff37fb55030d5fbee,2025-03-20T12:15:13.193000
|
||||
CVE-2024-13558,0,0,198540feb6d32f5c06397e557b4130a53b6cd8d868bbd03ff37fb55030d5fbee,2025-03-20T12:15:13.193000
|
||||
CVE-2024-13559,0,0,e4bc151d4fce3c77ee1ebfa44e64cd44d7e5d82c4b82e11f2aabe557304018a6,2025-03-01T05:15:14.700000
|
||||
CVE-2024-1356,0,0,6cb6186c899ef9742e559deecf7de4862ea2bb78bef5eed0c472ae9df79196b1,2024-11-21T08:50:24.133000
|
||||
CVE-2024-13560,0,0,bc3576a3348779a87640a25b38dfdb4ea2739f3634c8fab6266670a556723a3e,2025-02-26T13:15:36.800000
|
||||
@ -248151,10 +248151,10 @@ CVE-2024-13913,0,0,9abf24935e6c0a1b302d08befb2921c990a37653bdc7c4751e540fe6b4bbf
|
||||
CVE-2024-13918,0,0,aac9d206b672ba1aab6fed634936e376969cf60ac5105bcd290dee3cb04643fd,2025-03-10T17:15:34.383000
|
||||
CVE-2024-13919,0,0,7c5ab092a55439dc8c02bc97bab1d29d32b755887059a3b61b9ad224908cb057,2025-03-10T17:15:34.540000
|
||||
CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
|
||||
CVE-2024-13920,1,1,11616b250a0f30e142f7f6dd1bcb47818a2a1f7a96d54e70f4bb75c39f492fd1,2025-03-20T12:15:13.477000
|
||||
CVE-2024-13921,1,1,fe798fc3319471437ac754a700e7becabbfd79bc945347b64d37df3b50938ac6,2025-03-20T12:15:13.633000
|
||||
CVE-2024-13922,1,1,d13ae7cb0a8bd7a7271b03758d5718ded9a48dbcbf84b58b15c5c14152041d07,2025-03-20T12:15:13.777000
|
||||
CVE-2024-13923,1,1,86938e28a189150cb3e62ee6b064aee85c8946f1d859cb61a37558fa18b92ba1,2025-03-20T12:15:13.933000
|
||||
CVE-2024-13920,0,0,11616b250a0f30e142f7f6dd1bcb47818a2a1f7a96d54e70f4bb75c39f492fd1,2025-03-20T12:15:13.477000
|
||||
CVE-2024-13921,0,0,fe798fc3319471437ac754a700e7becabbfd79bc945347b64d37df3b50938ac6,2025-03-20T12:15:13.633000
|
||||
CVE-2024-13922,0,0,d13ae7cb0a8bd7a7271b03758d5718ded9a48dbcbf84b58b15c5c14152041d07,2025-03-20T12:15:13.777000
|
||||
CVE-2024-13923,0,0,86938e28a189150cb3e62ee6b064aee85c8946f1d859cb61a37558fa18b92ba1,2025-03-20T12:15:13.933000
|
||||
CVE-2024-13924,0,0,e36e603c0c6b6f9989e25340b54970575d329cf8a84edf152fc0708bf80f6812,2025-03-12T16:23:39.567000
|
||||
CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000
|
||||
CVE-2024-13933,0,0,5443dbf12b39bfc2acfe1adbc39c04300f987a9bcfb56ac22130681b41f5e2db,2025-03-19T12:15:14.003000
|
||||
@ -248503,7 +248503,7 @@ CVE-2024-1759,0,0,c8ba467071cf346ec745a9e5d8e8597a923cfb677c329e24e430d58ed7e0f0
|
||||
CVE-2024-1760,0,0,f99a8273390511ad1054b3ffd59fbe5d1b1fda332a65d7f44aac5e257eb729f3,2025-02-04T15:36:46.757000
|
||||
CVE-2024-1761,0,0,696b99dd7b537aa0c1eec44716a7fae7b7ea27081267dea188c31272ed5a2bff,2025-01-21T16:53:47.587000
|
||||
CVE-2024-1762,0,0,fe2beae86ebf429743526632269b9e47ac722f6147b2c8ea526e0fa203619a09,2025-02-07T17:47:17.933000
|
||||
CVE-2024-1763,0,1,8012c9da585ee6f917a9409a9833d6a11a3350a300f66a5f7f8d81c0e859cb09,2025-03-20T11:05:42.940000
|
||||
CVE-2024-1763,0,0,8012c9da585ee6f917a9409a9833d6a11a3350a300f66a5f7f8d81c0e859cb09,2025-03-20T11:05:42.940000
|
||||
CVE-2024-1764,0,0,9af00bc3a2cdec19cf0cc3ce6677a0f4b515b26edef4b60b7c6a5e9330153847,2024-12-04T16:15:24.527000
|
||||
CVE-2024-1765,0,0,59c91913d171a81fb5475f94729055825298c4825c2c1c89296f006dcdad04bf,2024-11-21T08:51:15.800000
|
||||
CVE-2024-1766,0,0,d8ff872b7c733da8ac7e1c2957ad11b4600ff77b669728faaac2462853b27909,2024-11-21T08:51:15.920000
|
||||
@ -249609,7 +249609,7 @@ CVE-2024-21024,0,0,22798d4b68c52eb493cfe689aff459faaf8d179b78e934d2b2ef2680c2710
|
||||
CVE-2024-21025,0,0,cb940b17b62838bae7c7173612add05e07812946f7f9845c549dee6f7e994c8c,2024-11-27T16:31:12.720000
|
||||
CVE-2024-21026,0,0,499523ab9c42adbddcb9465d525bd64fdafa00b45a36fba8323a728fd7860532,2024-11-21T08:53:38.623000
|
||||
CVE-2024-21027,0,0,a61ffe37c9f1d4a384893fde109de27008fa272fa0f6ae950bf7e6f33ee668bc,2024-11-21T08:53:38.737000
|
||||
CVE-2024-21028,0,0,6fac0a34dcfd7478c3d0533c7c1609e188895cb0192863cbded254d4f33ef117,2024-11-21T08:53:38.853000
|
||||
CVE-2024-21028,0,1,540b79219f5e222f7319884f080746d7f3a0b5d84060a59af31e4a5b500bfaa1,2025-03-20T14:15:19
|
||||
CVE-2024-21029,0,0,a2164eec77648fdd187f7ca3636a9757ed8fcb3385453331e8f9516a022bda95,2024-11-21T08:53:38.967000
|
||||
CVE-2024-2103,0,0,d75ea97133463dd8923821c5ae7569e4e5c73171dd75a860d96581c3124dd721,2024-11-21T09:09:02.603000
|
||||
CVE-2024-21030,0,0,7b587cff009995d57bff3e773b4aeffb9079cc2de653785fcb6de0a0ac044979,2024-11-21T08:53:39.080000
|
||||
@ -252266,7 +252266,7 @@ CVE-2024-24418,0,0,f85fecb180b6d307c07fe51a03eaefe0a799ecd1335016083acf800b061c0
|
||||
CVE-2024-24419,0,0,6461e4afd495f91efaae96c55ee7f319576a8bc399f40f12fa7c06ee46c446bd,2025-03-18T21:15:23.910000
|
||||
CVE-2024-2442,0,0,253b87e62399d3a6af245d178e21fd710ca2545ac6e1dfd17779d2dcf3253a0c,2024-11-21T09:09:45.697000
|
||||
CVE-2024-24420,0,0,a9427fa07db4986b0d9c0e963da0c4c6a915285d7c2c249b528b587f5ffa804d,2025-02-18T21:15:20.800000
|
||||
CVE-2024-24421,0,0,97a85089fd7991d19460b26cfacbebab9e686820dc534e03e0b00953674d1be4,2025-02-18T21:15:20.973000
|
||||
CVE-2024-24421,0,1,4e88dd82ad383565ba11e76981a0269bea9f13e2d5180a75bf3471976b15d75f,2025-03-20T14:15:19.150000
|
||||
CVE-2024-24422,0,0,cc1fe911e5d9bb47992bcf93c1d25d6815fc8e41d6031807026099db7d254742,2025-03-19T14:15:36.380000
|
||||
CVE-2024-24423,0,0,2121b9c97716cc2d66ab960276b0a7ffe452fd6d2561b1b2c197696cdf4f4830,2025-03-18T19:15:42.503000
|
||||
CVE-2024-24424,0,0,c7c1f65a8bf5b7819bfe95e7f58b682fa72633acefcfa8308066d9af4263deb3,2025-03-14T16:15:29.560000
|
||||
@ -254643,7 +254643,7 @@ CVE-2024-27359,0,0,be475d000f5021d6959e65f4bafe704d89d8d833c8d9a5372f53a3261a6b0
|
||||
CVE-2024-2736,0,0,42479b81c7b7bb1f0cc691ae9843f3a641e8308bbe69be2da07a921df442435c,2025-01-08T17:24:59.387000
|
||||
CVE-2024-27360,0,0,77efb6dac120a74a11618c9e38ba64c067450192f4f4e7551dd0a979307a6c9d,2024-11-21T09:04:25.937000
|
||||
CVE-2024-27361,0,0,77d90ea36f27bea18e74dba7c2e8422a0b7db46e4c92b699af7c71e56fcb3f57,2024-11-21T09:04:26.190000
|
||||
CVE-2024-27362,0,0,8fcbfe3c3547e93103323dff220f142e81361fc5323b166a8e70487632531ddc,2024-11-21T09:04:26.353000
|
||||
CVE-2024-27362,0,1,3cfa4859298354e800c227d27fcae704da703d96a129b5c2eb835d351d1004bd,2025-03-20T14:15:19.310000
|
||||
CVE-2024-27363,0,0,000816135a5e0d34cea85b831dc31727f98550e96055ef57f0a1c37b792f2304,2024-11-21T09:04:26.527000
|
||||
CVE-2024-27364,0,0,2b38d7b61761eb8fae8574705214eff11f6fa32157870ade9ec7bb3c14e790a7,2024-09-11T15:27:12.647000
|
||||
CVE-2024-27365,0,0,5f8f510f6e0b2a91244e70e0993e7fb6e7757ce7481e4f49d2f55067f2792978,2025-03-14T17:15:43.023000
|
||||
@ -257549,7 +257549,7 @@ CVE-2024-31292,0,0,986b0ab4060b29cfcfee9fe97b6b0ff950c81bb21a038d80f5fc683b5e6c2
|
||||
CVE-2024-31293,0,0,d8d6e6f78602b0ad0a4154e787b97348df673ad113624edda1a675b28218194b,2025-02-07T01:39:13.393000
|
||||
CVE-2024-31294,0,0,5ed5372a360b624a446e22a07eb2be5cf527e32b35d5c2864187588206647b63,2024-11-21T09:13:12.927000
|
||||
CVE-2024-31295,0,0,92ada23cfd6b9ecf1c9856a40c55ed02ad211edfe8a7aad41b745ec36391491c,2024-11-21T09:13:13.067000
|
||||
CVE-2024-31296,0,1,4b98196e8a482dd177eef76c99fc33b1ffc94589f146e866b4fe06d74ff7a463,2025-03-20T11:23:10.463000
|
||||
CVE-2024-31296,0,0,4b98196e8a482dd177eef76c99fc33b1ffc94589f146e866b4fe06d74ff7a463,2025-03-20T11:23:10.463000
|
||||
CVE-2024-31297,0,0,2d029b4bdf26fe82a64b0a1aaccf74e271b6454d079b4835e5fa2ac47d2bde99,2024-11-21T09:13:13.333000
|
||||
CVE-2024-31298,0,0,2958a144e3dc4e7d636f12ca52c8876629cdc355cb056d2115099db4cfd60ac6,2024-11-21T09:13:13.447000
|
||||
CVE-2024-31299,0,0,ec5b4321e0a7ff9d16e5bf5531f41c6769ab3cd1532edef61e0876574b7dabcb,2024-11-21T09:13:13.567000
|
||||
@ -260256,7 +260256,7 @@ CVE-2024-34795,0,0,2980eb2b04f58009ca6933ac9c2bf39140881fed0d4ffa2acfa127fd3bb26
|
||||
CVE-2024-34796,0,0,adf77aa5ae0b05b743ffb54f6e8071cbc89938c22f10224c355d78ba52b91d39,2024-11-21T09:19:24.990000
|
||||
CVE-2024-34797,0,0,6f530aafb0c79dc6e1942bac34aca54d202e7a50e42a13f1b4f171aef5c26c91,2024-11-21T09:19:25.120000
|
||||
CVE-2024-34798,0,0,d31a3d4fd1229237b83c5c7aa24a3b9da19c0978a5ec908f9d14385769b6cc2c,2024-11-21T09:19:25.243000
|
||||
CVE-2024-34799,0,1,3a804e7cf1bf1801cf92c2f65a7cef93e3d84eb614d9b73830c0b9b15e152bca,2025-03-20T11:11:29.417000
|
||||
CVE-2024-34799,0,0,3a804e7cf1bf1801cf92c2f65a7cef93e3d84eb614d9b73830c0b9b15e152bca,2025-03-20T11:11:29.417000
|
||||
CVE-2024-3480,0,0,4386cb7c92d4ea0092f4f37d0eaf7cb53af2a8cb277ab46fd30ed1ba5a016e08,2024-11-21T09:29:41.613000
|
||||
CVE-2024-34800,0,0,260e98247455ca4d7b68d5e5e5aa8394998a0ba07440b738afbc3bc365fd83af,2024-11-21T09:19:25.483000
|
||||
CVE-2024-34801,0,0,627140b69a4f1b08cf615778bde031ce8ff206c76e21b02504465d28129ab9d1,2024-11-21T09:19:25.603000
|
||||
@ -261453,7 +261453,7 @@ CVE-2024-36366,0,0,1ad2bd86ee83972344f0b6d1bad7348c121df781e8bfb5e105b00680fac7e
|
||||
CVE-2024-36367,0,0,641557a81dbb2c7e627cce689572504d103545c194da9b835536d1ed1a22c9ed,2024-12-16T15:15:11.200000
|
||||
CVE-2024-36368,0,0,db58c03bed12cd47c6e92371f3cee4963e9f815b9a39d4dd27c6c09d87c5337d,2024-12-16T15:14:56.433000
|
||||
CVE-2024-36369,0,0,86335f126149b45fcfe791d3a51b05f9b5c2ef6682670204bff02f19d0fd3666,2024-12-16T15:14:39.120000
|
||||
CVE-2024-3637,0,0,21120798a280816ab7cf3ed70bbd1f108404954e011a1d26b78f2314da517882,2024-11-21T09:30:03.153000
|
||||
CVE-2024-3637,0,1,03aa85e73d93eb97b66e879231cf557ae036455ea78f110b4dd4c6bbfb3c2ad5,2025-03-20T14:15:19.667000
|
||||
CVE-2024-36370,0,0,7197b09dbd5b84f4171470c9be6f834edd16667f764d0dab4aed81738c95555d,2024-12-16T15:42:30.397000
|
||||
CVE-2024-36371,0,0,8c67a57a561267db81a9d6dfe521c9fb10d023875446899a4b38782e30ce8c2a,2025-02-07T20:11:36.747000
|
||||
CVE-2024-36372,0,0,372fbfef63703cf93d6911c25ac6a1b3dff36ab3730b92a722024f922c3e1785,2025-01-27T18:40:38.827000
|
||||
@ -262290,7 +262290,7 @@ CVE-2024-37388,0,0,57cf4af147a424250df7b46d4b3e45c17f1c85f1e3b7be38767484284423b
|
||||
CVE-2024-37389,0,0,1489604a1203f3e496edb5968007e7712bc53e8ecdd5d37a8fdbbb54a5a6e772,2024-11-21T09:23:46.127000
|
||||
CVE-2024-3739,0,0,e485b7726bfb9c0e0538daf95db79a608df3dc6996a1c1fff88cd1b1e128d791,2024-11-21T09:30:17.087000
|
||||
CVE-2024-37391,0,0,83604059a0a3493e2890c3d7d2ec3ff1f78123fc0b5c774b0cb9659167e26236,2025-03-13T15:15:45.533000
|
||||
CVE-2024-37392,0,0,68322f4c961f1aabf72adbea5d801fad10c749a00a1f8ab2d2555d5ef58cceb8,2025-01-09T18:15:27.790000
|
||||
CVE-2024-37392,0,1,2ddcfdda121ccf673d3c3575ba342373b49a9baac2c6a11d1f9b50a7a51a719f,2025-03-20T14:15:19.487000
|
||||
CVE-2024-37393,0,0,59f9709c253a77f24571bf0211deb5a06ff1bfae384e16dec166534c4a1c2a5e,2024-11-21T09:23:46.627000
|
||||
CVE-2024-37397,0,0,645394d57366af4d14bd72b0f709a5f25542d1f984f3b92daf1f425614dbe561,2024-09-13T16:35:09.630000
|
||||
CVE-2024-37398,0,0,0f42760c0326cdea8f98f78b855bbf63b71770b97a72517371b459e84e271523,2024-11-18T15:23:23.543000
|
||||
@ -264863,7 +264863,7 @@ CVE-2024-4084,0,0,a28b137c9c522b2744d2cc719744fd799a787e733e6ed4c14866cfffc6da3e
|
||||
CVE-2024-40840,0,0,14bdf19150fd7acf49468e39cdf6efc98838dab91ac000670442c80f0c1e00a7,2024-09-25T19:42:49.173000
|
||||
CVE-2024-40841,0,0,4a95dd6a234443731d705e87950516814e31e11699249b315c7fa66892964954,2024-12-12T15:44:20.363000
|
||||
CVE-2024-40842,0,0,db2523caf221205dc10c3a414f106b2b11ae0a5ac1a11334c3597c355ad607ed,2025-03-18T20:15:22.593000
|
||||
CVE-2024-40843,0,0,8829e3a23cccba1ae50f91356127ff0b529c10fe5f02005e5dcf2ce88d5f4ad0,2024-09-24T15:02:53.987000
|
||||
CVE-2024-40843,0,1,8ea6be3efaec2c9e5133481462753fc84e21702aed9f7fdd4c3bfb05d4355cdb,2025-03-20T14:15:19.813000
|
||||
CVE-2024-40844,0,0,913ad32f130ba48f710de944124bb663e932b9a1efef6f615196eef21a07dff4,2024-09-24T15:55:13.020000
|
||||
CVE-2024-40845,0,0,ff022e47079c0e2640046a45a9238cfa77665c1eec1ab3ac2bfa695dbfb76ea1,2025-03-14T17:15:46.070000
|
||||
CVE-2024-40846,0,0,9b851b4ce2280168886b830fe034334f0fa1485f27e31834954a719ee17a0457,2025-03-17T16:15:22.280000
|
||||
@ -265338,7 +265338,7 @@ CVE-2024-41473,0,0,29d4e7b54fb4126a361ecc042f6a7b31e6afda88ff19b4c6fc756b4a5212f
|
||||
CVE-2024-41475,0,0,b8be933a7b93d0c1cf4b6c4176e5022fbe4f2cb5fba128f6278ff8ebfcb5d463,2024-09-18T18:51:25.513000
|
||||
CVE-2024-41476,0,0,36071a8bb76fa7000bdd44fd6508ba17d20e4aae8303bd257093c61563aaa3c3,2024-08-12T14:35:13.627000
|
||||
CVE-2024-4148,0,0,2e542f9ab0f6c828f38b2e237e7cc980ff3e9e70e4486defcf952616ff1a655e,2025-01-30T13:15:10.093000
|
||||
CVE-2024-41481,0,0,6eb5de345a9525c442ab97a24184da0c8a5a6c01c4d00868ab2a9512a25cc800,2024-08-13T14:51:33.017000
|
||||
CVE-2024-41481,0,1,8208c7d3079ff59622479471ec534e219ab8ebf8f0a17d77e9eb69a949649acb,2025-03-20T14:15:19.977000
|
||||
CVE-2024-41482,0,0,58ae3affe6e4394d947e5aa2d9dcb7a3ce735382358e46a1f77100da98d84172,2024-08-13T14:51:43.163000
|
||||
CVE-2024-4149,0,0,f45d768064d804412c5499f92694d8be86562e7ca241a43abd934c3f16fce1ed,2024-11-21T09:42:16.890000
|
||||
CVE-2024-41492,0,0,d4569622d2ded7aa848fdcf6b8717deae380d497519daf4660cbe4b6bde4ae2b,2024-11-21T09:32:43.510000
|
||||
@ -266322,7 +266322,7 @@ CVE-2024-42634,0,0,e316dd50ac7dd29fbd6d3ac410c9dd2e383d0fa3a5124d95a220d9396a05e
|
||||
CVE-2024-42636,0,0,22ddef02b2b67750bcb1bcbe76c7dedd5d6120870d17cf9424899ba2207db432,2024-08-23T18:35:04.560000
|
||||
CVE-2024-42637,0,0,7ab579a16c75673edf60ac8a3c57e5d93e8a15ee1bb0faf828bd0c37998bf12d,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42638,0,0,2c1b857f0b965ac40814489cb21be9b393c58462d1ddf36b59e226e27acdcc88,2025-03-17T15:15:41.303000
|
||||
CVE-2024-42639,0,0,ae37b1b7ad01c960465c980c3af4377ff9ccb779a7ecb0e0e91e2f8a45079104,2024-08-19T18:35:13.310000
|
||||
CVE-2024-42639,0,1,7ae4bb182bb632802f21a7f071d6ecf69b498e4a7b1d31bfaeb90705ae0f6221,2025-03-20T14:15:20.170000
|
||||
CVE-2024-4264,0,0,a9295252e6ae8012e96f6ab16d3bdbd8ae0aa19058b71f0f60f84b3b14a65d86,2024-11-21T09:42:30.250000
|
||||
CVE-2024-42640,0,0,e2483a866051d6ad5491e120ca1e63baafa96b595191cf3ff24d316cd3ae355b,2024-10-15T17:35:04.623000
|
||||
CVE-2024-42642,0,0,8b9dbd65dd33a84fe9cea5686d35e4d710f2dc020d9e983ec9c75281204c9951,2024-10-24T17:35:08.450000
|
||||
@ -266458,7 +266458,7 @@ CVE-2024-4292,0,0,aadd195e174cdf2c4fac6389aaff8dc86b25c7743bd2be9bf1a6d13c5672b9
|
||||
CVE-2024-4293,0,0,69c583a6cebc1663d985b0b5aab80748ed48988cde39273d49cc94d02a735243,2025-02-27T17:10:22.713000
|
||||
CVE-2024-42930,0,0,fc971e94549728ba453549a80dd65aa5424c61cea7d4fdc47479a2cdf067adf9,2024-10-30T21:35:04.850000
|
||||
CVE-2024-42934,0,0,1230de0d8b2dfa26c1ccbdc909ca39b36c856f70ea241827e7d7fc70ef4ace93,2024-10-31T20:35:05.250000
|
||||
CVE-2024-42936,0,0,ca47f93d6990a2ed2b66cc8e745a3b54d17ec522c5c7ef2a46ef719b194312c2,2025-02-18T21:15:21.830000
|
||||
CVE-2024-42936,0,1,db0d41b68cc2e69ed3676bbcc599462495bd3248682056610088b87d107575ec,2025-03-20T14:15:20.333000
|
||||
CVE-2024-42939,0,0,4547b4b1e0943985622e8f34eff1a8bb854051e0a4587d88630db6433049cbb9,2024-08-31T02:58:34.660000
|
||||
CVE-2024-4294,0,0,978c41a128903ef94c19265c7b92508697bb43ce92abd5e24991df929ea21ba7,2025-03-10T16:18:28.643000
|
||||
CVE-2024-42940,0,0,b0d827c11b94f934185bd71744960303141938187c6d4d4091c6fd4d8544de72,2024-09-03T19:35:15.163000
|
||||
@ -267583,7 +267583,7 @@ CVE-2024-44134,0,0,1612170244774fb2cb867230c7f5140525c8398caef327a950c8a1f1680c0
|
||||
CVE-2024-44135,0,0,1f924f524e9404eadff6cf55bcdf5ce85faa4ce5abb51a5bd0b4ada1a8260302,2025-03-19T19:15:41.400000
|
||||
CVE-2024-44136,0,0,47f88abd6453d6797640eb3202b455efa88abb286d5ec26cab193900882bd1e7,2025-03-04T15:30:49.700000
|
||||
CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000
|
||||
CVE-2024-44139,0,0,227592f6930f5804ef7361e5c64b194003d6a9fbe8100b1944463ea300dd6852,2024-09-24T18:30:34.863000
|
||||
CVE-2024-44139,0,1,be06b795fe6d7868956b3a70d447846cad4f23d9f9a466844492bf3101bd5609,2025-03-20T14:15:20.510000
|
||||
CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000
|
||||
CVE-2024-44142,0,0,4afd7ef53a2dfe128a5ff6336e36df1d2c0f052696b3178fde4b8df4c9c5a909,2025-03-18T16:06:18.150000
|
||||
CVE-2024-44144,0,0,9b76d7b551b1f0186bb586552a7b8b7528c49f9926c44e33ae408477bdfe743a,2024-10-29T21:35:14.290000
|
||||
@ -269346,7 +269346,7 @@ CVE-2024-46919,0,0,caee3ec5db2611d5674f255e6e4093f56001d0cd40bf7d98b7791ae4b5538
|
||||
CVE-2024-4692,0,0,f05887f354d4b5a1374a63331763ec3fab53a73a54d461bd27a99fbb622b007d,2024-10-21T16:10:14.873000
|
||||
CVE-2024-46920,0,0,b32520b4541741819e59354b8e0dcf0eef99f4c8b248bb03a8dc5b52b8a5f76d,2025-01-13T20:15:28.613000
|
||||
CVE-2024-46921,0,0,71dee254cc2f309e1467d8fa6e97afa4a8c64f91201f645efed32b11d86fccc6,2025-01-31T17:15:14.113000
|
||||
CVE-2024-46922,0,0,6bdd5d60ca2de902a066d900eb3f1a02f2bc8961d2c788d1e656cf659ba11e92,2025-02-18T18:15:23.653000
|
||||
CVE-2024-46922,0,1,e625a1ca27e7ce46289ec0a52bbb8a54160d642b79f4e4aa86349ef0bca78ae2,2025-03-20T14:15:20.660000
|
||||
CVE-2024-46923,0,0,e734050db8ab7cc8ca637234ab5af2701e708c793b446c418723d1f652b62f80,2025-03-13T21:15:42.060000
|
||||
CVE-2024-4693,0,0,a9c8482c3ea2d347585fc5de3f7febf7c02e48c514bcd2a505cc67d911f0408a,2024-11-21T09:43:23.560000
|
||||
CVE-2024-46933,0,0,2ce9d989b382fc5bee082bb98227d9250a7b0964296c06eece80ce41c6d661cc,2025-03-13T14:15:31.887000
|
||||
@ -270565,6 +270565,7 @@ CVE-2024-48580,0,0,e540b5d156a186615d240d0f099de52f053b3a0dab4d95b774286d8b7357b
|
||||
CVE-2024-48581,0,0,d36eaf42a8c013f5398a1310ef6b2089c8383aae1cbd0f696279268a4ee67822,2024-10-28T13:58:09.230000
|
||||
CVE-2024-48589,0,0,da15b9606dfd0e77f375ffad72377af01dd4bccbaa88f234dfa1d5b761376490,2025-02-11T15:15:17.637000
|
||||
CVE-2024-4859,0,0,0aacc5a3cb0a14cb14387eee0566e83bcbb93f6f27bda5c3ac0cfa9bf2864566,2024-11-21T09:43:44.833000
|
||||
CVE-2024-48590,1,1,d60bdb7fb92ba62d6115d2ea3f7727429c51024d142f6c29ebd26d5e1f7049a7,2025-03-20T14:15:20.830000
|
||||
CVE-2024-48594,0,0,d5a52e0d152b31106cf7b89cec0f7550cdb6375f901b4c018ce4b1c02e80a117,2024-10-30T17:35:14.010000
|
||||
CVE-2024-48597,0,0,dbc3f2eb04f06991684cd7c9c46a9fb0207e1947f5c88a8f399960e50271d80d,2024-10-23T15:12:34.673000
|
||||
CVE-2024-4860,0,0,731d4e23354be097812d72b15d7e6992968e209a4c37edc22419fab0e7ae3b67,2024-11-21T09:43:44.947000
|
||||
@ -271522,7 +271523,7 @@ CVE-2024-49896,0,0,4608f4ad6e42fc06461da5fe65db12307f9fbe5bfa7303d6f5fcef17c6b60
|
||||
CVE-2024-49897,0,0,f21982453a3cc8fb19103718e352b342409eb035002c07e7f2b7106c2e90b1a9,2024-12-14T21:15:27.100000
|
||||
CVE-2024-49898,0,0,22bc129ba8563c9e34b1b3fa5103ddc830b89baaba8bac6e23fc2d64c3db40a3,2024-12-14T21:15:27.313000
|
||||
CVE-2024-49899,0,0,be6d440e13bc214f8fcb8c201e3d1de8a8e46f184cb3feb3671077af7da4cef7,2024-12-14T21:15:27.483000
|
||||
CVE-2024-4990,0,0,72b27b076f3f0b2f49a5bca9c191dd14ccc83f24df53f266a99a4492487ae48a,2025-03-20T10:15:32.603000
|
||||
CVE-2024-4990,0,1,ac500ecd8d67c819832ab19149b742d9b068d1a489f8cc4beaac6d11a7cd49ed,2025-03-20T14:15:20.940000
|
||||
CVE-2024-49900,0,0,be46534a57a20d58cec505e48cd7d8142f6ce9dcfbd590e163062dad5e7a918e,2024-11-08T16:15:31.090000
|
||||
CVE-2024-49901,0,0,449600b0174e94289f7aaeaf2eda13e5e7905c5d31ce1024a439b0b5127bb706,2024-10-25T14:05:16.967000
|
||||
CVE-2024-49902,0,0,fcf302aa2f436b65d2da6d0a300010a8c5652bc11fcc195dad9599c58d20adcf,2024-11-13T13:47:16.923000
|
||||
@ -272421,7 +272422,7 @@ CVE-2024-50947,0,0,b5c008650b1de4762f100f17a965e455e14b58a340b5da1077acb62ce0721
|
||||
CVE-2024-50948,0,0,a83a95d033c1f852658f7838a2af99f42aaba2f1b7026fbced6a0131c0382cea,2024-12-04T22:15:22.627000
|
||||
CVE-2024-5095,0,0,18b4308f836a45ef93eb8dd3e5b61ffc05eba17456c204bd53a6a5094eca36bd,2024-11-21T09:46:57.340000
|
||||
CVE-2024-50953,0,0,0d9047013e59df5720140c1f66c4526adf1647380de84da3a699f682624c0d64,2025-02-18T22:15:12.210000
|
||||
CVE-2024-50954,0,0,a26f247eb8f3974e6b4ecd190acdb08702561c133b3592f87f0c7d35e39be60f,2025-02-18T22:15:12.327000
|
||||
CVE-2024-50954,0,1,02068458dd8d6a2ffb99f46bf4d0a02d5a8b6d37dbba06978db764a483c085a0,2025-03-20T14:15:21.033000
|
||||
CVE-2024-50955,0,0,d286c5359e65ec4107e3297ae49fde58b3efeb0287b5581ad11b8684b68fae9a,2025-03-13T19:15:48.793000
|
||||
CVE-2024-50956,0,0,cd8ccb18453c11262209c6e4973c32ca207270a933eedc52f0d4a58126b3fbdd,2024-11-25T20:15:09.383000
|
||||
CVE-2024-5096,0,0,158df124ac63cd0f2f1e57be7cd9d0373dc2a0ceea7bd2bb10f556aa3af44df8,2024-11-21T09:46:57.483000
|
||||
@ -274968,7 +274969,7 @@ CVE-2024-54440,0,0,9b88f7d99cecca6e6d64d74e7bc4b9afd66c4a9b5857582e450bf8ac5f697
|
||||
CVE-2024-54441,0,0,4998045381787fcc4b3ba91881da0472af2407cb6b3b4e86c69cbecd8e8e1ec5,2024-12-16T15:15:23.130000
|
||||
CVE-2024-54442,0,0,4654114cbbe36af251b0a17ca273aa4c42991899ac7df3d541352dc363b8b95d,2024-12-16T15:15:23.273000
|
||||
CVE-2024-54443,0,0,a19735fa20af88aa6b80d25f5f3fba13bc36980cd33611fe0939754004239647,2024-12-16T15:15:23.420000
|
||||
CVE-2024-54444,0,1,c20d412e8c110d9c428cd585d8c937ebdddfb168d6b852db22d2e1df975e5eac,2025-03-20T12:11:53.293000
|
||||
CVE-2024-54444,0,0,c20d412e8c110d9c428cd585d8c937ebdddfb168d6b852db22d2e1df975e5eac,2025-03-20T12:11:53.293000
|
||||
CVE-2024-54445,0,0,79d2b578bb9c47c0ec49e493d011f256b6b50e476de6283513b55937e31b5c96,2025-03-14T18:15:30.203000
|
||||
CVE-2024-54446,0,0,f9e645000b4f39077e03afcc74a6e2d5d45571677851846e639616c10a139375,2025-03-14T18:15:30.343000
|
||||
CVE-2024-54447,0,0,0a746a07e8bd291ded6eeafb47a5003c642b24654a250b379eadcd2adaa82746,2025-03-14T18:15:30.487000
|
||||
@ -275754,7 +275755,7 @@ CVE-2024-56255,0,0,e25a417498dee039f9b9bb01d0aa00b5e9649106ae99313547414bcf56b7b
|
||||
CVE-2024-56256,0,0,e02d1c8c5bc51a1b179a5bca398725aea9ad7a89db71f48878c2f5bce3510a46,2024-12-31T11:15:09.543000
|
||||
CVE-2024-56257,0,0,e31ff6866c2c4c35beae38750d7442e6309a0a5186f5a5bb07d11dea1360b332,2025-01-02T13:15:07.963000
|
||||
CVE-2024-56258,0,0,bb3d522bfb9ec7084071bd1458c20c85e22eedc9d1860d39a552090ae935d658,2025-01-02T12:15:27.510000
|
||||
CVE-2024-56259,0,1,e0c8412cdeea2f98f8cc31ff1f731125fd8e9f5cd79097d0d7d07cb01ec086af,2025-03-20T11:30:46.587000
|
||||
CVE-2024-56259,0,0,e0c8412cdeea2f98f8cc31ff1f731125fd8e9f5cd79097d0d7d07cb01ec086af,2025-03-20T11:30:46.587000
|
||||
CVE-2024-5626,0,0,93ceb7b86ba8ddeb56f02be4839062ac9cafc2abafa79ca42f7d116eca5e4c5a,2024-11-21T09:48:02.503000
|
||||
CVE-2024-56260,0,0,77782cf1bcec62863b0b7099afb29f72582a9c0dac2b55d67631c27108ab1e8e,2025-01-02T12:15:27.780000
|
||||
CVE-2024-56261,0,0,b8a50327124e69054396fe0d6d8b0b9034f14ca027569c69a311832fb342e769,2025-01-02T12:15:27.920000
|
||||
@ -276503,7 +276504,7 @@ CVE-2024-57473,0,0,d4deaefeb6fcbba59b8ce003fdeaebe59c96858a04f801a87a31eff516a54
|
||||
CVE-2024-57479,0,0,a4fc4c04a4d0cd0e22b8fe1e9d84faf33bcfbb80c5a2b55e9ddb9daa820188a9,2025-03-18T15:15:58.493000
|
||||
CVE-2024-57480,0,0,8afd2f2509d24fb5fcd6d83f3abd7082d4bc0ce361a4921ced1cc67aa295a249,2025-03-18T18:15:28.130000
|
||||
CVE-2024-57482,0,0,859c1ed6b53c872a2c976c747abee784c7f6cb88ac30b945b593d0bb4868f5bb,2025-01-23T17:15:17.677000
|
||||
CVE-2024-57483,0,0,d80de86b8577cf6f4a0d95e5f2ea9968ae2b8769217aa4f6a37a72d077531697,2025-02-18T22:15:15.143000
|
||||
CVE-2024-57483,0,1,718c2397b7ee766ae1581a06e6b5ee3a31d1472fb49ca307826c60720c946e7b,2025-03-20T14:15:21.193000
|
||||
CVE-2024-57487,0,0,7babb41ac17147ce892708b7e46321375976a25b6830def13d44a67b1829677d,2025-01-13T20:15:29.090000
|
||||
CVE-2024-57488,0,0,cab6b66e7059e8f245e671e69563c712386f2de2b58d5eb8328ea47276f13531,2025-01-13T20:15:29.240000
|
||||
CVE-2024-5749,0,0,36203d1040051e343d9d050a3c2e3f863a807627eb7d14e1470ca394531f4751,2024-10-16T16:38:43.170000
|
||||
@ -276617,7 +276618,7 @@ CVE-2024-57657,0,0,b09c438a14c3db4fe411704529d496d2bb6233f86346a91943c98c21994b6
|
||||
CVE-2024-57658,0,0,e12e2e5c80101e7e7b06d323b6720ff3675db1a8a27ec11343898fca21b6fc03,2025-02-18T22:15:15.713000
|
||||
CVE-2024-57659,0,0,f32b1ab826823776ca0c8a17c8694a17edb2ecd676fd6e2f2814340b2ca52fc0,2025-01-15T15:15:13.450000
|
||||
CVE-2024-5766,0,0,67725e17649b0f8972fafe3ef5c9865eb73f6e4c38e03fd4908cab0e675ef8cc,2024-11-21T09:48:18.263000
|
||||
CVE-2024-57660,0,0,88c987ba4540341aa705a587cfdfec7c3f00e6285f6c4d6b5a9ea3f6268a91f9,2025-02-18T22:15:15.830000
|
||||
CVE-2024-57660,0,1,767487331585534693906d19eed16dd08ba791ffd30c9ff7fb412ad7be1e1f37,2025-03-20T14:15:21.353000
|
||||
CVE-2024-57661,0,0,6d08cb67e58ae875891d256b6bd08dc049d206ee925b20ca33928959aac61174,2025-01-14T16:15:34.240000
|
||||
CVE-2024-57662,0,0,dde74e7238b4f4135dd41986a6589f04bf57c54ee09407d6ad9eaea1bfaead1f,2025-01-23T17:15:17.830000
|
||||
CVE-2024-57663,0,0,af724e08b2512d2fac8b54c94a21a2980259518668a0fc995304976d26139003,2025-01-23T17:15:18
|
||||
@ -278103,7 +278104,7 @@ CVE-2024-7049,0,0,3ed1b44b3add6a7b5afeddf885ae26eaf09447a652c502b043770537058cab
|
||||
CVE-2024-7050,0,0,06f451073f052c5171cdc858230f8ac0bfc1cd03261b82c9e4025ffcee809ad8,2024-11-21T09:50:48.257000
|
||||
CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000
|
||||
CVE-2024-7052,0,0,b869d4be8a9ef05b526f5074ec778788ff68c0dc06586eacf01aecd8a404162d,2025-02-14T17:15:18.480000
|
||||
CVE-2024-7053,0,0,42619b2d75ecff17bb72d6b297e35d5aae26bf8bcf32c3513b1851cc7979e694,2025-03-20T10:15:36.217000
|
||||
CVE-2024-7053,0,1,780c9d848134601253f66f22e1bd2bcc1d9dd0cda906ee21b6c0278b9f69c330,2025-03-20T14:15:21.553000
|
||||
CVE-2024-7054,0,0,dae977ba195c466d627a19bcd62fa740dafe560e6a8fd5014878665bd52d8b35,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7055,0,0,9935f1de2cee66b07954ad120fe6ce5f54f36d3188fd3d2bc5c8e7d48d543152,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7056,0,0,ec08ae131187a52a9d1409d290e6919fd556ee74677249d587bb18cc1ea21e30,2024-11-25T14:15:07.457000
|
||||
@ -278759,12 +278760,12 @@ CVE-2024-7763,0,0,2bb0069c10c49c394434577c411e688ec0e38c5bfa827add12427bf96ca994
|
||||
CVE-2024-7764,0,0,aba7fa791b67ddee6e91c320b0f5308cad7c95f9bf24520207cbc2678388b56c,2025-03-20T10:15:36.717000
|
||||
CVE-2024-7765,0,0,e0986466b0016ec6db480b569653a5a0d523298e015f452fa2aed13b6f463e0c,2025-03-20T10:15:36.867000
|
||||
CVE-2024-7766,0,0,d14979bbb21be0f1e33dd13bb8ac8aa192112b4d26281d207dd0af825983d02c,2024-09-26T20:37:18.900000
|
||||
CVE-2024-7767,0,0,5432b646d52b4454c9cae989871999b6dfa811078b5eb2716cca5af4b4895232,2025-03-20T10:15:37.007000
|
||||
CVE-2024-7767,0,1,ec3b13e0afad40a1603c117f67f1b3ca45fdfc5b7a0bc0d95cf6790f7b4f659e,2025-03-20T14:15:21.697000
|
||||
CVE-2024-7768,0,0,adbbef945e5100a59e354a28d1c822816b13fc184f7cc36a6a5a4cd065a0e6cc,2025-03-20T10:15:37.133000
|
||||
CVE-2024-7770,0,0,d144948d53cf7a2fe1e80e41ba3f0d8bcd5e6e660c76cee450b8106e9deb27fb,2024-09-26T17:49:17.457000
|
||||
CVE-2024-7771,0,0,88fdae4e398366a03a1ae316055af270b6b5aa00630d7c4015e0142809fbb6c0,2025-03-20T10:15:37.257000
|
||||
CVE-2024-7772,0,0,396b4597e25e547435b7faa77b18bd9ca62c7d2ea5d3c311d5015d799171c4ed,2024-10-02T16:10:49.387000
|
||||
CVE-2024-7773,0,0,79884efad438fb8e04b03e9e3863617e06866bcecfba80ab2b39b580b32a07d6,2025-03-20T10:15:37.393000
|
||||
CVE-2024-7773,0,1,06c44578a0053a8e22f1d611df6f2cf85b6e2034032b16d487209ca4ec43347b,2025-03-20T14:15:21.793000
|
||||
CVE-2024-7774,0,0,4e4e13ce1c7814e538ce8c1c913f7f3bd71fdf1386aa44aa9b64c07a2218eb14,2024-10-31T15:39:04.510000
|
||||
CVE-2024-7775,0,0,85aff6affc98cdbcd7e92d0b586bee681b645ef08f2c175be8949a69d8ec938f,2024-08-26T18:18:22.887000
|
||||
CVE-2024-7776,0,0,1c16e10531d1327b0384eb3402126268a532a224051bb002f3475000e8209d6c,2025-03-20T10:15:37.520000
|
||||
@ -278996,7 +278997,7 @@ CVE-2024-8017,0,0,5e0f0040fd6d8d733b91bb077c8b0fa74b7d2336260f72b52452b9d5177dd0
|
||||
CVE-2024-8018,0,0,b7e1b555ede861555814825288c3003c2053547fd912d3149ae1092d592fe6fe,2025-03-20T10:15:38.887000
|
||||
CVE-2024-8019,0,0,de3ec14c02dc85e87d5f1cc81c6aa4fb2ae2fdc988128074c969b6c093087176,2025-03-20T10:15:39.010000
|
||||
CVE-2024-8020,0,0,b36705156619d31ad44530ca93fd75d04556b5a5ebecd285f8beae508486c07f,2025-03-20T10:15:39.137000
|
||||
CVE-2024-8021,0,0,22faf242aac469d2adfe469824599a70d04ea91881468701b305c22559bbcd6d,2025-03-20T10:15:39.260000
|
||||
CVE-2024-8021,0,1,fc9a8a3d0393f342aa8feff06c8b6eb6fcd052be7bbf1af8098be8f3e69431a4,2025-03-20T14:15:21.883000
|
||||
CVE-2024-8022,0,0,ee3d8b54bc0b0b17ad96b91114790ab25b5a536bbe36cb188cba8f36dec52123,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8023,0,0,61a92bc8448dc47a65d0bd143c811b4c703b14e871acdf616b3acef8aff34c21,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8024,0,0,cec4217e2c19633c8f10571f92164b7002bd86833ac717efa8e94e195a4dfb21,2025-03-20T10:15:39.380000
|
||||
@ -279025,7 +279026,7 @@ CVE-2024-8048,0,0,ff295b9c9c8fa93e0c6a3b5204f97237c28cc4185a00b44db9d7dce4c3cc3b
|
||||
CVE-2024-8049,0,0,274cda9f191d2467ab1f7fb567537911ee77e963260dcea32ea2b6e62622893b,2024-11-18T17:46:38.177000
|
||||
CVE-2024-8051,0,0,8e9fee878d5e7631408c4906ee6d422d2dad39846c3e9dba922a4347408befb7,2024-09-27T18:19:41.863000
|
||||
CVE-2024-8052,0,0,01bfdadf93739fc2d4fcd8ca2ee549a442e377fc63e756e286ed6ad0eef90332,2024-09-27T16:55:57.383000
|
||||
CVE-2024-8053,0,0,2bd655220e3f715e7337b8d7b5d296ef06fdde60ae654d2e92e281b9711e2980,2025-03-20T10:15:39.993000
|
||||
CVE-2024-8053,0,1,768eef01375c78a74dca1db6bc39e488a62b5b2829c3b11df4860704f7538440,2025-03-20T14:15:21.977000
|
||||
CVE-2024-8054,0,0,7587a87813e515f4d1b36dbcf3c7051a83e94df022103a0c59749ae8c66becaa,2024-09-27T21:29:57.607000
|
||||
CVE-2024-8055,0,0,e14beb40fa719542b0530358c0d6284da2fbc8813aa8d27c56a70b725b1ba929,2025-03-20T10:15:40.127000
|
||||
CVE-2024-8056,0,0,0063e3259bfec678c90e65014b514e3fc5b53335b06f114b8add8272bc670dcc,2024-09-27T21:29:42.600000
|
||||
@ -279066,7 +279067,7 @@ CVE-2024-8093,0,0,658097a3f03fb7b07930350cc5b4a7146f8d518799ba824b264c0334bbd362
|
||||
CVE-2024-8096,0,0,8a37207d9f2a46b185481a3796a938184964cdd0c881235f37b08701a0d522c6,2024-11-21T09:52:40.063000
|
||||
CVE-2024-8097,0,0,c73e330cf372ba66691065108ce7a7c3faa714d62d6d305b38abb0b1408d0b60,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8099,0,0,60bcdccaa46762d88cbc1d228a9af35fcd658fa49f6f9dae5819f583b1183f98,2025-03-20T10:15:41.013000
|
||||
CVE-2024-8101,0,0,3e4c165096dcd64c8c28a48f89ce05208c3300da1814152ee7eee0fa372e23f7,2025-03-20T10:15:41.130000
|
||||
CVE-2024-8101,0,1,d15187f7c9ed4b266d60872981d998e66e792b835fba05bca0f46fa3ec0539f7,2025-03-20T13:15:36.007000
|
||||
CVE-2024-8102,0,0,c8d7e80f3d01e30f125b61e16f2075e20200cf969389ffd8a679fa4e25d12ca9,2024-09-05T13:28:54.747000
|
||||
CVE-2024-8103,0,0,c2a7656e489435896ea57a9d9970fe3499a0bb14c13a60e9b0db54bcdc5dc797,2024-09-30T14:20:16.063000
|
||||
CVE-2024-8104,0,0,e493a0bdd9ca485d90b4c1faac1d17a7f4cda81ecf7833fe4a37d0f679df8b4b,2024-09-05T13:28:06.817000
|
||||
@ -279117,7 +279118,7 @@ CVE-2024-8152,0,0,98db9d7dc13f1febbb0cf16a3d1b4428b631ac462754e50d563613430895bd
|
||||
CVE-2024-8153,0,0,0effa1d585d92b22b2bee0160ab2cf7b99ed45e0729ec56b891bdb22a3f1b97d,2024-08-26T19:04:44.310000
|
||||
CVE-2024-8154,0,0,ca9e06a7d89404a0292aa904efd8321ba7dee429ae970ccfc2f57c75b90c2259,2024-08-26T19:06:34.983000
|
||||
CVE-2024-8155,0,0,6294ff0f9bf12227a0434150d97903610dae7f20264328cb3f31cf4229925798,2024-09-12T13:53:23.827000
|
||||
CVE-2024-8156,0,0,209b20433c99824e164d9ab6ca90512160933a8e9a1464fa96090c983ed581d3,2025-03-20T10:15:41.247000
|
||||
CVE-2024-8156,0,1,c620650aa3f75450b27ddf5dd7eb09556430c66d3737a2b29c8bff59ead6b031,2025-03-20T14:15:22.073000
|
||||
CVE-2024-8157,0,0,f194cd811aae8618c2c4369d94ae770b67b76f78a64aed0c01651ba5a55d47d4,2024-11-21T18:15:15.043000
|
||||
CVE-2024-8158,0,0,944909102e9270c82fa14e85bb24ad783610d6fe36a2602f90346c0ac4091a54,2024-09-12T21:00:00.573000
|
||||
CVE-2024-8159,0,0,57585c099c6e71816992367a7f5e0a7b52a1b97612eb9511539812f640cb8c59,2024-10-04T13:50:43.727000
|
||||
@ -279415,7 +279416,7 @@ CVE-2024-8483,0,0,5195ba758d6242bcccf2c248e56be79d4b9654410f6f169122c92d0c6b15f2
|
||||
CVE-2024-8484,0,0,e466c3875728036a2a9b4c89a8305493672d041c885c3b58c536c50de9cc1d74,2024-10-02T17:44:13.687000
|
||||
CVE-2024-8485,0,0,7da6ab34afa2ac24f2a2d46141ca9ec2b3fec75691fe7f053cec823f479e4df5,2024-10-02T16:19:15.993000
|
||||
CVE-2024-8486,0,0,72c8d12fbda6079a657a7f7d5227b28970fafaa525b2f5c74dce370135cee472,2024-10-07T17:48:28.117000
|
||||
CVE-2024-8487,0,0,bf9faaeeb74502214229b844f62abcf3671acd3c89bb37a61eeb23f21d113a7f,2025-03-20T10:15:42.360000
|
||||
CVE-2024-8487,0,1,ec10a804b29650135c3cefe30166c8106b2b1b2b83110e7e5f98ccf8bd1d1cf7,2025-03-20T13:15:36.117000
|
||||
CVE-2024-8488,0,0,3018a5659d434cc801dc5e3e8a6e3f6b1d0cf4538dce2991c2254ff7a5f65d98,2024-10-10T12:56:30.817000
|
||||
CVE-2024-8489,0,0,52edfd2b7389b20e647ab142918823acc91e245ee93f963df371a8d7f4fc648e,2025-03-20T10:15:42.490000
|
||||
CVE-2024-8490,0,0,62bf39487dc10cd157d6355db7b678c26d37a733716806928b901a962cb34d9b,2024-09-27T18:36:00.053000
|
||||
@ -279474,7 +279475,7 @@ CVE-2024-8552,0,0,70425fcd76e2369e4f564ff13922902378a4810d60a83152b70c4e59b4a95b
|
||||
CVE-2024-8553,0,0,26561801580e04aa21c5000b17dc07cb325ac8eca0511de872259669245de7db,2024-11-06T09:15:04.370000
|
||||
CVE-2024-8554,0,0,228d834dcd3f41195363e5c1711d64c5b0eed379efa685020ea628e379455c43,2024-09-10T13:52:23.250000
|
||||
CVE-2024-8555,0,0,5a758da3985d194a1f0ef1f54640bcffd33f895627c4fecd537e62fbb689167e,2024-09-10T13:53:11.847000
|
||||
CVE-2024-8556,0,0,cdc8e82dc6f99723992d85f7fcf9598707b5cb6424289e459ce2d5cabd07b687,2025-03-20T10:15:43.230000
|
||||
CVE-2024-8556,0,1,acf4ff2956a53bd51191c5943f697cafb5df08b1d66d2a22ea4d280652663733,2025-03-20T13:15:36.213000
|
||||
CVE-2024-8557,0,0,cf8dfccd1335edd5c89c2034caea817398936144dc2c2c33df530aaca4136055,2024-09-10T14:19:36.280000
|
||||
CVE-2024-8558,0,0,e613269d580840325b2489df61eeb8337bf0f3a386faa55a5d3b7612bb6f9291,2024-09-10T15:50:24.143000
|
||||
CVE-2024-8559,0,0,49a9895b592ce20ad4dd76c68d2e7295942ca6b3b2c38dc64019571b971c23ab,2024-09-10T15:31:32.443000
|
||||
@ -279668,7 +279669,7 @@ CVE-2024-8765,0,0,476ee0c5aa9650972097c78aa7b881c6caab39588565ad830b7f4fa773900d
|
||||
CVE-2024-8766,0,0,6a1d0fd4381a2aefa3c3ebd3af5a6a5535392c6f90911151b52ef1d8a2df5478,2025-01-02T16:15:08.817000
|
||||
CVE-2024-8767,0,0,33d117715b6ccb12375aec292e3823ec127bf8cb9f35e261208b79e9c4041c2f,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8768,0,0,68f3eb07488e96273391cb6bb54e3745accce33e0ac973772852eacb968b15fb,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8769,0,0,f1cbb934ab93ba50b3961a0951ee5994879e97027cb8493c3156727a06d85ae2,2025-03-20T10:15:44.220000
|
||||
CVE-2024-8769,0,1,8bb9c587ca0a2e9b810fe8a773c98422603eca09e382786db33af4881988c405,2025-03-20T13:15:36.303000
|
||||
CVE-2024-8770,0,0,c7113885ecad220e747c3ea367cfe403add592b8fe01afb3e0bedfd37441b198,2024-09-27T13:49:29.690000
|
||||
CVE-2024-8771,0,0,0e4ebb772d4e98e8a4a526dca961dd5c09acde45f28acffd114423f8f3c183ac,2024-09-30T12:46:20.237000
|
||||
CVE-2024-8772,0,0,e8bacf7bfc0ec5a21b856ef5850c73cdc0412d618e7556967faae405da0f4139,2024-11-26T08:15:08.033000
|
||||
@ -279846,7 +279847,7 @@ CVE-2024-8954,0,0,136495b47853816b760c8cf66770d1244c15457a64f73fdd74da85e3de78f6
|
||||
CVE-2024-8955,0,0,c1b148cfa42004d4dab2e8f83a4423b2660db66669b816680c4531b1a960905c,2025-03-20T10:15:45.087000
|
||||
CVE-2024-8956,0,0,d05dd0e86b32f79dfafef581ca7f3185d2618ea7886f798509ed3bccd73be818,2024-11-05T02:00:01.697000
|
||||
CVE-2024-8957,0,0,6175e643f46339ff132c2346994cb23e9f442b046b5039790534affc3054adb1,2024-11-05T02:00:01.697000
|
||||
CVE-2024-8958,0,0,50c7603fce09b5aa851705a4a781f0e91424faf2222aa1275b1dc6e4d061f369,2025-03-20T10:15:45.220000
|
||||
CVE-2024-8958,0,1,937a10daf3f6960233f3973b2c9a05e8597bd780125b24e1707f9d20214ad264,2025-03-20T14:15:22.220000
|
||||
CVE-2024-8959,0,0,bde237c149fec6c92210fdbbc7aacdd281f76acf15c3b725ea185fe4a892f9ad,2024-10-25T12:56:07.750000
|
||||
CVE-2024-8960,0,0,5206ec29ce7fd60504adf115ea6b5b2889bd827689cb9c5d920d592cf8c3b416,2025-01-29T19:36:35.170000
|
||||
CVE-2024-8961,0,0,0e23951b1c11ce66a850bb476328c998d665b24a66ba7865bdc4d4c8a88285ad,2024-11-19T17:01:15.787000
|
||||
@ -280429,7 +280430,7 @@ CVE-2024-9608,0,0,0fd2e957c376544247f8b2a16ef434733b8eb47ee4d1d04d34b8ba94ac48e3
|
||||
CVE-2024-9609,0,0,a32ad4ba0330c8bd46a334ed0a6f34b381196d6ee0adb5a1527caca9a51b5222,2024-11-19T21:28:42.670000
|
||||
CVE-2024-9610,0,0,f327439241391b51adbb56ced5a29061a4e9cbef39684c65a214212a54ae604b,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9611,0,0,049688b12d23536b7521af43a85c6bc56a995bcf550dd4b062c24ab61d06803f,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9612,0,0,dfae4d1023a5df70c767fed1285fa9a93091ccbea1b5a3c68ce1160a6e87843c,2025-03-20T10:15:49.560000
|
||||
CVE-2024-9612,0,1,d2b3712b4258a2237356693543fd1aa9c558c0e952b599ddcb02d5804006beab,2025-03-20T14:15:22.310000
|
||||
CVE-2024-9613,0,0,f7f019a18c9e01f36efde66dfbb10d6eba11ff87ade2b8efd8a79811ebe63128,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9614,0,0,89d6ad4791713c9131b15fd858d4bd9404ef7090c81b08570775178f0867f84e,2024-11-13T17:01:16.850000
|
||||
CVE-2024-9615,0,0,c9468917c9754e631849fcee424e37c3bdfdc0ce7baf1874e3cbc9e2bb677dcd,2024-11-18T17:11:17.393000
|
||||
@ -280686,7 +280687,7 @@ CVE-2024-9896,0,0,3adb19d39d02ce2ee570a7726fbffb3aaef96e44b637197ad8e5d0de67af08
|
||||
CVE-2024-9897,0,0,d10885bb1a732639d22e8cf3cdf237a94daac50b02bfbf8f8b46ddc2a8d8983a,2024-11-01T15:27:56.797000
|
||||
CVE-2024-9898,0,0,1537edc74ab6912e0f49b36b0b2f31dba2b9152cdab29cedc38dec7daa343d47,2024-10-18T12:52:33.507000
|
||||
CVE-2024-9899,0,0,6c76ba1fcc7597d7958a7e74c7de009221352c8fe34414d847a1d4d85ee09e27,2024-10-23T21:15:15.050000
|
||||
CVE-2024-9900,0,0,23890e3c68d390425ef1e68069c4270ab1727ec0b87943f80359cff841e0c85b,2025-03-20T10:15:50.417000
|
||||
CVE-2024-9900,0,1,ac53ba8c7847af9a535bd2b64d25996d1ba83089feecfd12a53cada003a7fb09,2025-03-20T14:15:22.403000
|
||||
CVE-2024-9901,0,0,9ebdfd08ad6d03e64b48300c44bda422922a5d1abb4658f8574bd3d53377dd8e,2025-03-20T10:15:50.540000
|
||||
CVE-2024-9902,0,0,988cf1e25e07eba8fa29aab2e0822f1bb86c9b585332e08c3140d35a61eec696,2025-02-25T20:15:36.143000
|
||||
CVE-2024-9903,0,0,3419001cde5082b79796b9c94795511915defc2d60c542640b205ea9a613358e,2024-10-15T12:57:46.880000
|
||||
@ -280909,6 +280910,7 @@ CVE-2025-0244,0,0,a007094477ee1c52bbc6ad80ad1856461cbdef97dbf9502d29b149d107af9f
|
||||
CVE-2025-0245,0,0,d3f443614cf269edf96a7044d50adaa402232a03e23aa318a1f5e6bf4990a77e,2025-01-08T16:15:37.693000
|
||||
CVE-2025-0246,0,0,c39f5bdf37092ddacf9510ed2d75cd9204291d6d9bc9dd6c5bd8168e56e08082,2025-01-08T16:15:37.880000
|
||||
CVE-2025-0247,0,0,0125f498ef227ebc436135b5d9339a763bd05ec1f3a6e4d4fb60e8d0a9524607,2025-01-14T17:15:20.547000
|
||||
CVE-2025-0254,1,1,196a81bbb17bba05736dd651af49296e243c295e3d52b7511caf99525e94bdf0,2025-03-20T14:15:22.493000
|
||||
CVE-2025-0281,0,0,a129a29bcfb1ef9ab2876b8a3ad91d47775b87563c176e7a890fd116399ef380,2025-03-20T10:15:52.153000
|
||||
CVE-2025-0282,0,0,0b79992968afdfd3dca90a89278588bc0fa8213f971654a2b0fa6c3c0b74907e,2025-03-17T19:24:45.253000
|
||||
CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000
|
||||
@ -281023,7 +281025,7 @@ CVE-2025-0434,0,0,865677e7d723396f8f162183763a82d312d1d17bfef7ef19d82b8b00574da5
|
||||
CVE-2025-0435,0,0,60338c7b5ffc7e99e8a50f2cf427531bc1f9bac53588ae4248bf7b091dcac4f6,2025-03-19T21:15:38.093000
|
||||
CVE-2025-0436,0,0,040db70870a9b4a1f4f472cb714947a73423d7303f229ed73ca1d249dd10a962,2025-03-18T20:15:25.330000
|
||||
CVE-2025-0437,0,0,13fe255170db1ac9d25ee4d2027f7e4790c577c7c77e5e9506d3559bc1d4114a,2025-02-03T19:15:13.967000
|
||||
CVE-2025-0438,0,0,8c7333aeb87f87a4f7e9edbefc8fc5ab12029c07bdaef09c154718d38cd9690f,2025-02-18T22:15:16.743000
|
||||
CVE-2025-0438,0,1,08c4703e7314b15c95bd12464cca58b2a2639530903c5288a8aaa24274d51d99,2025-03-20T14:15:22.613000
|
||||
CVE-2025-0439,0,0,101658db461148311c4db52613ef0d8a033b47ac11db7b69a0cae87e2b2f57c1,2025-03-17T16:15:24.267000
|
||||
CVE-2025-0440,0,0,bab5646fe57be32b81759b8d43c7715137b5a3dd2925726f076ac6ff1f169843,2025-03-18T21:15:32.617000
|
||||
CVE-2025-0441,0,0,9be667b7ca3d6b0c4024db684ea154da0a17206dccf5623644eeb5915a246618,2025-03-18T15:15:58.760000
|
||||
@ -281457,7 +281459,7 @@ CVE-2025-1061,0,0,719d74f0f0646df1bcdf5186f15b6b006503d4de7dcd7fdf659e983ae5a279
|
||||
CVE-2025-1063,0,0,f6ebc08f6e2568783d19012ba06b647ad752279ad00c89461f145d2a92f0083e,2025-02-28T16:07:01.990000
|
||||
CVE-2025-1064,0,0,7b7164b210697e056675206baf5cc1f85c1aa8eb0b02774ad30b163694ee3ea3,2025-02-25T20:41:01.500000
|
||||
CVE-2025-1065,0,0,70a90000a3a4cb679474daa22883e05e6abe48ed1e55dd42dffa8e01fc4b0bec,2025-02-19T06:15:21.507000
|
||||
CVE-2025-1066,0,0,3fc22615f942b72b8cf5d09f7bd097e7cf373f3b0fcdec9d31e667deb7a70a15,2025-02-18T19:15:24.243000
|
||||
CVE-2025-1066,0,1,ea1d475b44d8de28b14f691f200e1ff9439b36f3af9912524721934b30c9a74f,2025-03-20T14:15:22.783000
|
||||
CVE-2025-1067,0,0,927436541ec90f91ee0c55a0f16d97d24f4f02b2b15a1545388407257072bccf,2025-03-04T17:37:53.743000
|
||||
CVE-2025-1068,0,0,34ea09810e1cb88030f7e45203d13961eec4e37f8d9cce7698642bd1dd286136,2025-03-04T17:37:41.050000
|
||||
CVE-2025-1070,0,0,63c9f6366f7886d6af04d22c614f55b0f42e20f4e6634878d1102f0014dfbfa1,2025-02-13T06:15:22.463000
|
||||
@ -281724,6 +281726,7 @@ CVE-2025-1488,0,0,36fbf18b75b2cce073f977d40194bcef308218e50fd3898ed63fe17e537331
|
||||
CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000
|
||||
CVE-2025-1491,0,0,2c68d92a6f55bf529fa37ef19f65078661a466e3bd99edb0dd7d2a7b0419f292,2025-03-01T13:15:10.750000
|
||||
CVE-2025-1492,0,0,b9223b4db500ae771be5ddc029bc738cd0c9e1261ad47ff66314ecd9bf92d1b3,2025-02-20T02:15:38.553000
|
||||
CVE-2025-1496,1,1,af98d675be57151ae867323c534c076061e30c35cde524c8f778ffde4167b7e5,2025-03-20T14:15:22.920000
|
||||
CVE-2025-1497,0,0,73c65262de8597db2330458449134b69d8689fcddf215f0ff2ac234a69e62d4c,2025-03-10T14:15:24.723000
|
||||
CVE-2025-1502,0,0,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000
|
||||
CVE-2025-1503,0,0,bf0115e84ffc3af0aac47a0335c32a67525411feb884b3b8341d4eecd156a3ff,2025-03-13T05:15:24.917000
|
||||
@ -281731,7 +281734,7 @@ CVE-2025-1504,0,0,605a331819c229096cc2c4923e74c9e91e1a9ba7f49878bc5577cb113c8bbf
|
||||
CVE-2025-1505,0,0,4ca6a7ac695c0aadd7c07c0b0b554235345ea5ff41d366464d688f8a76207c56,2025-03-06T20:36:32.810000
|
||||
CVE-2025-1506,0,0,56e7cfac203f4722aa6cad39100296d27461de65c7953a7f5e4e340ab83b346b,2025-03-06T18:54:45.667000
|
||||
CVE-2025-1507,0,0,085f56d06f66199f0d98bb7d083b47449b1fbc8b00fd031c578655dd7e33a4d7,2025-03-14T09:15:14.477000
|
||||
CVE-2025-1508,0,0,b209810aaca9c17cf5318eaaa420f1820d35b63cb55c07b44197444b0aa14ceb,2025-03-12T04:15:16.520000
|
||||
CVE-2025-1508,0,1,ec65239dbe7ffdef1a707b5ab0a34ed1dc416b8a5207f584ccfbef8fe7fc9ef6,2025-03-20T13:57:41.123000
|
||||
CVE-2025-1509,0,0,dd42a33d90057770cc0fff8a787b9ce6f9b83b6dcef0adadc46d0dded06e7aa0,2025-03-06T15:12:33.540000
|
||||
CVE-2025-1510,0,0,908b98a8ee37341a28713a06694a08e53c25ab91ce664e9dcc93619135ea532a,2025-03-06T15:13:33.280000
|
||||
CVE-2025-1511,0,0,279c911956f36e53d500484b1c7383564c6360bea4a7283f4d6a3dc61c829703,2025-03-06T17:55:34.303000
|
||||
@ -281903,7 +281906,7 @@ CVE-2025-1797,0,0,21932d476b45bdfb45af7756ea9c313776c862e5d32503d17ac7b8ec47d6a2
|
||||
CVE-2025-1799,0,0,ecb0d3b56d4b323c7219f9a8afa0b58675a5a7b2283b2f8ba1e01ad7d5346823,2025-03-03T21:15:16.707000
|
||||
CVE-2025-1800,0,0,ccd6f4bbccefc45f48ec444e61873d1dbe21c83cff41f19d6933a1cac20729cd,2025-03-05T03:15:09.160000
|
||||
CVE-2025-1801,0,0,a6bebf279dfd13940c53ee57820f3d2385eb4821c64d6b780ee1162086e6c089,2025-03-03T15:15:16.500000
|
||||
CVE-2025-1802,1,1,8baf246b279a56194b8fd72ea8f4f55f81e9a48ed8fe05c07cfd0cf86a14113a,2025-03-20T12:15:14.413000
|
||||
CVE-2025-1802,0,0,8baf246b279a56194b8fd72ea8f4f55f81e9a48ed8fe05c07cfd0cf86a14113a,2025-03-20T12:15:14.413000
|
||||
CVE-2025-1803,0,0,61b8ea959516cf458cfa0ea204219ee983e8adc2cba473f893652a1e07a05d40,2025-03-01T01:15:28.077000
|
||||
CVE-2025-1804,0,0,d9a84f00fff83ba1b976e1f99e54d8d7bd9d32a10eeb71378628c4f7f3e82618,2025-03-07T20:15:37.550000
|
||||
CVE-2025-1806,0,0,912413ec1862655f80c0924ce2f29f25f2ff7976c05332199dd89fb175bd2feb,2025-03-03T21:15:17.103000
|
||||
@ -283407,7 +283410,7 @@ CVE-2025-22802,0,0,4ee09a11670407cea09cb459dd4de4a2924f74334017dc53487f4f767d32a
|
||||
CVE-2025-22803,0,0,40579bef037b2313067d92dc65978feb36bebc6c2ed9d74c87c1ec3f2a0020b9,2025-01-09T16:16:29.627000
|
||||
CVE-2025-22804,0,0,f849e4fceefdae8c4a10bdfcd020e30e710279d149d09f73eaf1413b5639f4c9,2025-01-09T16:16:29.787000
|
||||
CVE-2025-22805,0,0,48706ba2e450e09bd94a95527a9affded1d7c5bdf1954e506fc7c0ba15e41310,2025-01-09T16:16:29.937000
|
||||
CVE-2025-22806,0,1,003f1960af19a3a7d2834a9c8e0c00662cab208fc10c0fa1b7f034cd16957102,2025-03-20T11:25:38.747000
|
||||
CVE-2025-22806,0,0,003f1960af19a3a7d2834a9c8e0c00662cab208fc10c0fa1b7f034cd16957102,2025-03-20T11:25:38.747000
|
||||
CVE-2025-22807,0,0,ced3f50260e3170a9fd485cda90cbb19dd2040ef2dde019f7e65e19c5e51985a,2025-01-09T16:16:30.253000
|
||||
CVE-2025-22808,0,0,1d405d848c33182da454380b95184a0511541dbaf161916a1cd9f31192056b68,2025-01-09T16:16:30.403000
|
||||
CVE-2025-22809,0,0,9639933c123de30217540507527e9ab6e2f2d9e2437d2d1fcc08b2e18f33c6ee,2025-01-09T16:16:30.557000
|
||||
@ -283451,12 +283454,12 @@ CVE-2025-22894,0,0,099d82dc8568fb50b5dde7926f3fbb32a13311bb5c7a970a54e9828e99c29
|
||||
CVE-2025-22896,0,0,cadb16b30aa07fd019cf5a31775c9c5a2a292f523d02b1c4ef2ed5d9558f302e,2025-03-04T21:25:33.663000
|
||||
CVE-2025-22897,0,0,9a22b887d81fcac41848fbf55628d95a06189013b3a027c7ddc8085a3cd9eb1a,2025-03-04T17:39:48.960000
|
||||
CVE-2025-2290,0,0,11af56ff6285a5f3028ad838da5752bac7bb9a41af222f693267b4ccc9e5ae68,2025-03-19T05:15:41.180000
|
||||
CVE-2025-22904,0,0,11fbec6328b596ed08ed392234d8935217007830badddad8b05907ab798c39a5,2025-02-18T21:15:26.993000
|
||||
CVE-2025-22904,0,1,f46e7567d154eb64bb50379cd0362c380a01047478cdeb7c8b7c70993e4fc47a,2025-03-20T14:15:23.117000
|
||||
CVE-2025-22905,0,0,bda5091cb8423b637c26775857bce84858d2915411a8d309230a6bd8a5902766,2025-02-18T21:15:27.153000
|
||||
CVE-2025-22906,0,0,dc0fdd210fffe08c72f299afbea7194cb399434a76d04819d6004eb76b91742b,2025-02-18T21:15:27.327000
|
||||
CVE-2025-22907,0,0,20b58859c8117d6948f4881a8512703bc1a347c501765ebfad2b82b119c89bb4,2025-03-19T19:15:44.263000
|
||||
CVE-2025-22912,0,0,bc13de059e2dac442bfb981cb719957ca16fc9db7927c792711a8a050a6d3b57,2025-02-18T21:15:27.630000
|
||||
CVE-2025-22913,0,0,cd3c3aefe7c3a5669cde7a2ee1d89cefb3b13bfe1cdbf0f6d928668a7ec0e974,2025-02-18T21:15:27.790000
|
||||
CVE-2025-22912,0,1,4957f47e6c8b906a99274165fe2b6132122b49fe67062be07a7b117c8e0a557d,2025-03-20T14:15:23.270000
|
||||
CVE-2025-22913,0,1,78cb787aa11587edea1bf14131cb93b96417dce962960ce24e566e922f13d71a,2025-03-20T14:15:23.423000
|
||||
CVE-2025-22916,0,0,894d45082057205ae80e6263e604aa99aac9da87f2527da37d587ece072246ff,2025-03-19T15:15:53.807000
|
||||
CVE-2025-22917,0,0,0d72f7ff6d66913d2820416ce95685d3bc853139131a9698fa080019dc84bb06,2025-01-29T16:15:43.907000
|
||||
CVE-2025-22918,0,0,34d0d301ce186de3a900525a1d20d1fc6818f460c83c7c8b34ef0ba83d9f1c2a,2025-03-18T19:15:48.183000
|
||||
@ -283489,7 +283492,7 @@ CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6
|
||||
CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000
|
||||
CVE-2025-23001,0,0,a661c9ff25c543dcf089dc4c4188fedb40f499aceeca183680e7eb66234e4f62,2025-02-21T17:15:14.103000
|
||||
CVE-2025-23006,0,0,85d3eb8a6cd7a895863210fc386b2b763ed49b703bb4f960bd8ede52b28a4e0a,2025-03-18T18:15:28.613000
|
||||
CVE-2025-23007,0,0,8755d54df92e87b37e4145f55351bcaff32866353888bcdbfad8a65ec70ebf2c,2025-02-18T19:15:27.263000
|
||||
CVE-2025-23007,0,1,d1b5ee041d1da4d5d9b473dbebc56e99161baeac6a945869046b5f76008d432c,2025-03-20T14:15:23.570000
|
||||
CVE-2025-23011,0,0,cefe33a46d0161bb6c6a24c1c3d6c06bd96db41dbbf7220897035ad8b05d8820,2025-02-03T20:15:36.823000
|
||||
CVE-2025-23012,0,0,21902a51089bbb86496843888942542af88455b4e3e34d54286f2fa9da81320e,2025-02-03T20:15:36.977000
|
||||
CVE-2025-23013,0,0,3fec3cd2c5a637941d673cd3a30388d6eceae58c49f808dfa1c8d532c5060c57,2025-02-03T10:15:09.250000
|
||||
@ -283559,7 +283562,7 @@ CVE-2025-23094,0,0,7cea7e6e51afc006925b4e48de2308fe64516f9177080ff30f9a60f654ae9
|
||||
CVE-2025-2310,0,0,3b3ba3523782ffedb97cb689c8e87d850ff86441e81973841824c42139be3b8c,2025-03-14T21:15:37.443000
|
||||
CVE-2025-23108,0,0,0867ae52bf9537919e00df206497183b5abf45a3a43e56579f476cc3d26e8d6c,2025-01-13T18:15:22.680000
|
||||
CVE-2025-23109,0,0,4d519c5c41161d21ebd8f814ea3659acc2224a598528dd7d3e4c7b87a5ad8cc0,2025-01-13T18:15:22.903000
|
||||
CVE-2025-2311,1,1,26401023a6b7f56743b7b030402e528f5773941bc69fbdc38984cd6ab15e2d6b,2025-03-20T12:15:14.750000
|
||||
CVE-2025-2311,0,0,26401023a6b7f56743b7b030402e528f5773941bc69fbdc38984cd6ab15e2d6b,2025-03-20T12:15:14.750000
|
||||
CVE-2025-23110,0,0,1f29652a619b8421219adac1a2002e9dc55acad71b98814d2bc2dba042d7f047,2025-02-25T16:46:57.373000
|
||||
CVE-2025-23111,0,0,bee2b37690105f94a2919f948d33470ba27eac7a0501ea5db580d8c336b4a360,2025-02-25T16:16:50.967000
|
||||
CVE-2025-23112,0,0,5295af5f2d972260409bf6e8ddb1e42cd398e210c99c068cbfdfd18c1a2f69a7,2025-02-25T16:14:20.857000
|
||||
@ -284373,7 +284376,7 @@ CVE-2025-24185,0,0,780ce933a4599922763fb258510562036511606364e33341b032c72a71c2a
|
||||
CVE-2025-2419,0,0,26560479da279f4bc0d3906a2859a1d9a09a31e7b1f3ab3c1e12831d111e2b42,2025-03-18T14:15:45.067000
|
||||
CVE-2025-2420,0,0,98e6f051dbce823ddc0a11342a5f0a648b5fe3c71fa6e4c1ac96d722ae7874dd,2025-03-18T13:15:37.770000
|
||||
CVE-2025-24200,0,0,0f6f41d17b1c80c9261ddc7d6ef23ac7e19cbdbd2c08a07eed9362b293d75967,2025-03-07T17:12:01.477000
|
||||
CVE-2025-24201,0,0,ce749944f29eb7a58a39f521ebc27f910b93ce1f347524410204067e6a960180,2025-03-14T20:35:27.923000
|
||||
CVE-2025-24201,0,1,5635dd9bbab12c7c74705486b0b6ed966690a727053a5e07b8e13547cf823c1f,2025-03-20T14:15:23.733000
|
||||
CVE-2025-24301,0,0,7b7c3fba06b103a537ce7db06429d9d2300d69047940e33831c6830c359206c5,2025-03-04T17:15:48.160000
|
||||
CVE-2025-24306,0,0,e210195f360c27240f00fdb72863ab45cdcc5e9e27f3265f94696064f329bbdb,2025-03-18T09:15:13.570000
|
||||
CVE-2025-24309,0,0,b881e80e18a543dac7caf5dbe4ebf8345a69e13fed09525eee5962b72198dbe3,2025-03-04T17:16:06.513000
|
||||
@ -284413,7 +284416,7 @@ CVE-2025-24390,0,0,53fee9e5767117124ab0c247372dae1e808caf6f2871cdd5b9d8bb2222404
|
||||
CVE-2025-24397,0,0,9ba22bfb54e58957b01d845dc69a58567b508933ed35160174e59b93ecc06487,2025-01-23T17:15:27.643000
|
||||
CVE-2025-24398,0,0,ee9da22a13b3c2a05aba47928897e56493040057408f7bc7be29fd032a4fd24c,2025-01-23T16:15:40.920000
|
||||
CVE-2025-24399,0,0,9e2b8368d79470df64393e92711907111b86a093d0c5d40914c6d8eac10d8a6a,2025-03-18T15:15:59.850000
|
||||
CVE-2025-24400,0,0,fc2d35dcc02dfde6472cd44ddd220493709314070b1167c1ac10abb11d37eaff,2025-02-18T20:15:31.630000
|
||||
CVE-2025-24400,0,1,688f55c8434b6d75b2a47eeaaca4c2596bd1613b0ce146b7759d1b11639da277,2025-03-20T14:15:23.903000
|
||||
CVE-2025-24401,0,0,4fb172772de67515fa4267387a9c7f60995cf88b73e8f04e780d1435e4b66f20,2025-01-23T16:15:41.050000
|
||||
CVE-2025-24402,0,0,f4550d563ce08a51c6e77d15a75001488a90ae02ca9b5c4a4edceb8828b16ab8,2025-01-23T16:15:41.190000
|
||||
CVE-2025-24403,0,0,68e26c7f774f1a67deb809321d2f4df1ab6809fd06c2450b0641f4bec4c46098,2025-01-23T16:15:41.333000
|
||||
@ -284999,8 +285002,8 @@ CVE-2025-25287,0,0,664f4953e1c6d1d3e1a32984d655969f7d6cbc9013ea11bc88e87bbf7e0a4
|
||||
CVE-2025-25288,0,0,0584d712e57f52bee8eae9744431d7edb4ff073c5208efea9ba9d4aad69105ee,2025-02-14T20:15:34.737000
|
||||
CVE-2025-25289,0,0,9f524d670b2ea0e928c8409b5f46ea35f805bd4f11134f0dcb16ef0bb77ce771,2025-02-14T20:15:35.100000
|
||||
CVE-2025-25290,0,0,927339a6905b50f325cf414d0d0e7fad53929abe8412c231085b72dda312b675,2025-02-14T20:15:35.593000
|
||||
CVE-2025-25291,0,0,c0d31e42861977597990d32bec96fa51e461a9843dc0ab355646426ee606b80c,2025-03-15T21:15:34.987000
|
||||
CVE-2025-25292,0,0,ba4cf64de5105004bb573a05f0773a0c1eea88efccda2fe4a13e0e2bdd03a6f3,2025-03-15T21:15:35.143000
|
||||
CVE-2025-25291,0,1,f1835428a95b689e982cf8fed8e892bce59e7e5dd4dfe38c15b065cfec7df445,2025-03-20T14:15:24.050000
|
||||
CVE-2025-25292,0,1,f0109f5d36aadb8f1601d476dd0de8ca220cc9dda804a966bda35416b9a25277,2025-03-20T14:15:24.213000
|
||||
CVE-2025-25293,0,0,75b4c2e39ac12a2c3d449d17b84245d13bd3782825afdf76368cf68cec382c6f,2025-03-14T10:15:16.783000
|
||||
CVE-2025-25294,0,0,f5f631bb0d3a66ef3946a184ab77f89389f0272dd7aa555e4fd92fae40ef72bd,2025-03-06T19:15:27.267000
|
||||
CVE-2025-25295,0,0,ab7cbec386eec3a44bf55fb5a8d6852f900324ec8d3c216c21202391f71c954b,2025-02-14T17:15:20.230000
|
||||
@ -285041,7 +285044,7 @@ CVE-2025-25382,0,0,88d0c9aebff390fe6125675f7fda1114ad4b4dbbaf723b80d3bea82edb3ec
|
||||
CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000
|
||||
CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000
|
||||
CVE-2025-25389,0,0,c4fa8037812de3d612838c95ec3fcc9b936e3b28bc2aa3e854f709efa62e78c8,2025-02-14T17:15:20.663000
|
||||
CVE-2025-2539,1,1,9d4fd27b71db1e294b40f09a5a5a229fea068c434b1aebddde556e8921721bac,2025-03-20T12:15:14.900000
|
||||
CVE-2025-2539,0,0,9d4fd27b71db1e294b40f09a5a5a229fea068c434b1aebddde556e8921721bac,2025-03-20T12:15:14.900000
|
||||
CVE-2025-25426,0,0,108c4b754e54717537bad215341cffab6a867457930f1858a7d85368cf0a6951,2025-03-05T17:15:15.320000
|
||||
CVE-2025-25428,0,0,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0edd9b,2025-03-04T16:15:39.597000
|
||||
CVE-2025-25429,0,0,a95bef6ecb2c9e9037f1ebf79f87a2b0c7101933c3f64e22cf3f921f022ed0ed,2025-02-28T23:15:10.903000
|
||||
@ -285273,7 +285276,7 @@ CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4e
|
||||
CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000
|
||||
CVE-2025-26311,0,0,8f41ce6db700f92fea4726f2c9198369bec586ae5a386ba2dec789165ea39c8e,2025-02-20T21:15:25.907000
|
||||
CVE-2025-26312,0,0,f394aa1aa4dfb775ebb7188f76a9b0a21eaabe1fd9b9e3fe5dc73353a18f5288,2025-03-17T16:15:25.637000
|
||||
CVE-2025-26318,0,0,16686eed1a2dd200b3d251994a33e38e9220f5ca5f67b4df87c6beb26b606734,2025-03-05T17:15:16.180000
|
||||
CVE-2025-26318,0,1,37a227ec04cb06a6666466de1108bef82e3fad90fe6fc7e33cd05b6f886caa90,2025-03-20T14:15:24.353000
|
||||
CVE-2025-26319,0,0,f00500492e7a3f0a2bff919ad8b60c606fcf031aa95c7496eeafad4b93d44cff,2025-03-05T17:15:16.340000
|
||||
CVE-2025-26320,0,0,2c7c4543047844dc51d38a0e0844ae377a705f600f7e38264bf4c89a9fa42fbb,2025-03-05T19:15:39.173000
|
||||
CVE-2025-26325,0,0,f233a1914d47e95e53a6a85e3edce01b96b7b4e30f0938bdbc0790a0c40f83bd,2025-02-28T22:15:39.927000
|
||||
@ -285469,7 +285472,7 @@ CVE-2025-26768,0,0,17051f6b50700105d1cdeb1d93490b73181876c37bff4a770dbbca224df2a
|
||||
CVE-2025-26769,0,0,ce08a6c04d6d9d7cfe6a08cbac2855cb075ac725570fcbdc709512ac38778cfe,2025-02-17T12:15:28.550000
|
||||
CVE-2025-26770,0,0,58e7c71e0ac873fd5253876cd79624d523c33d6d728641b89a44e8229c67714d,2025-02-17T12:15:28.687000
|
||||
CVE-2025-26771,0,0,8952cc3a8350893437c94ac8ee3475d38f5ba255ec7617dc59bf75d31e8a37cd,2025-02-17T12:15:28.833000
|
||||
CVE-2025-26772,0,1,e0253b405d26c0acf4ac037cd41c093db348a26c0d4952d5f6ab78a89abbb9d5,2025-03-20T12:20:45.623000
|
||||
CVE-2025-26772,0,0,e0253b405d26c0acf4ac037cd41c093db348a26c0d4952d5f6ab78a89abbb9d5,2025-03-20T12:20:45.623000
|
||||
CVE-2025-26773,0,0,d49de72c13c2b86c2a31c05293d547eb9b0be3797bd82de8c3f9ffd6b4c04d67,2025-02-17T12:15:29.123000
|
||||
CVE-2025-26774,0,0,526dfe51d520753de4e60d175888e5d8ca8738aa723fd20bff017fe643f4fb4b,2025-02-22T16:15:32.060000
|
||||
CVE-2025-26775,0,0,52cdf659c6c58d7b65216ee908b2b8b467178ee216ba1f7aae1e466a75c0462c,2025-03-19T20:39:46.850000
|
||||
@ -285518,7 +285521,7 @@ CVE-2025-26913,0,0,6404f4027080b1b189a02d4823943b3cde1c26a6a1695b9a80537c5a912ca
|
||||
CVE-2025-26914,0,0,e8e50bb802b33c4b312da6233f8df7199b76a4f553414230d6e4d4e0415c258c,2025-03-03T14:15:56.500000
|
||||
CVE-2025-26915,0,0,e63561d7adcf992fc96846addce01208e0fc68636cda02f3f3ede272653e6e46,2025-02-25T15:15:26.793000
|
||||
CVE-2025-26916,0,0,f758c32d09b38a24f4c348c15aba8cb3a44ed6c4ea3664e23dee9d5858835140,2025-03-10T15:15:37.830000
|
||||
CVE-2025-26917,0,1,3fc39fec66986a8b7bd40f698f506534d61e59c6582e491b1216365ddb3f6932,2025-03-20T12:25:42
|
||||
CVE-2025-26917,0,0,3fc39fec66986a8b7bd40f698f506534d61e59c6582e491b1216365ddb3f6932,2025-03-20T12:25:42
|
||||
CVE-2025-26918,0,0,e0fc59a79e46c5fcf8cafd0b2b3657455a0238ac9b7d59603d1a8c12f6ce4a03,2025-03-17T17:57:36.580000
|
||||
CVE-2025-26921,0,0,c2442d28350ae7faf4df30b8935eab7e61e5cf8ba448a3d60bbef0e85d56ea9a,2025-03-15T22:15:14.517000
|
||||
CVE-2025-26924,0,0,49cebed7e80447b71d19993301efab305d1259be135138e224586f0226f3187e,2025-03-15T22:15:14.663000
|
||||
@ -285903,7 +285906,7 @@ CVE-2025-27826,0,0,1af8c747c5098697d6723ab302d54ea95cbfca134be905c245ce434802448
|
||||
CVE-2025-27839,0,0,2897e6016e5e328d150ac9e956e1e3698f33d754fabb81cbdb31c6766dbfb22d,2025-03-08T00:15:38.340000
|
||||
CVE-2025-27840,0,0,4f077c11cd42874f9ea8d03fc4b2dba1a597eef072d62ce316763a23259bd33d,2025-03-12T14:58:54.130000
|
||||
CVE-2025-27867,0,0,34728fa5af8938af6d116e9c5118e28249371e0842dcdc39a9f7feee21691d1c,2025-03-12T18:15:26.320000
|
||||
CVE-2025-27888,1,1,dcbe5c1f6652c537417a3b871210f8a73f6dfbcaebd727c8c1bf99ddc54f8035,2025-03-20T12:15:14.563000
|
||||
CVE-2025-27888,0,0,dcbe5c1f6652c537417a3b871210f8a73f6dfbcaebd727c8c1bf99ddc54f8035,2025-03-20T12:15:14.563000
|
||||
CVE-2025-27893,0,0,e84577b5fcdd778bbc1f7429e59a23dbdaffc7f181556a9020c20ce55649162f,2025-03-11T14:15:26.033000
|
||||
CVE-2025-27910,0,0,0bb94e3f7527c14f76129f12ea1086d3e9a5c32bf0c93521589ebefce719530f,2025-03-12T16:15:24.253000
|
||||
CVE-2025-27911,0,0,10e67228aa90db73c3414ce28096a25aef6cbc3f128533308c9edad1912d6fdb,2025-03-11T08:15:11.500000
|
||||
@ -285983,6 +285986,7 @@ CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c
|
||||
CVE-2025-29030,0,0,5c6a6bbb988d8463666139df5df874e45be8a953aa025e17f70aff541e298642,2025-03-19T19:15:47.790000
|
||||
CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bdeb39,2025-03-19T19:15:47.940000
|
||||
CVE-2025-29032,0,0,de0e6dba36725e7eb376f4f499583a9ba773e23f18ca4062299593c1211d4783,2025-03-19T19:15:48.083000
|
||||
CVE-2025-29101,1,1,18d2cbad5c8b235e8ef9b9169f1b067dec1f11f872a8278319bf676efb28f716,2025-03-20T13:15:36.467000
|
||||
CVE-2025-29118,0,0,544cc61f27b329117a892d08f384d5737c3e9c8a3738f1368db354f799c3eaf0,2025-03-19T19:15:48.220000
|
||||
CVE-2025-29137,0,0,60d01c1f2ea1a4852779ae5347a42a9c78e823ee0ac7de08f61d7134be2334df,2025-03-19T21:15:41.063000
|
||||
CVE-2025-29357,0,0,ddd0f218f7f0a63a4864093fc2a3ded7f064b1382e370d0ee41cc0a1c1a3ddb4,2025-03-19T15:15:54.690000
|
||||
@ -285998,6 +286002,8 @@ CVE-2025-29386,0,0,f142ce16dea374d9a9926fc7db0f8c42e7cb63baff73e2c1cd84f28fd5ff5
|
||||
CVE-2025-29387,0,0,b884feacdec450fec77e09de60b95a7b9adedf54ff8f4d0b7df747bf1bec2f45,2025-03-17T19:51:04.180000
|
||||
CVE-2025-29401,0,0,5960fa825f3ca9babeed4b3834be7738456577242f6a1e28c67620bf622471fd,2025-03-19T16:15:31.827000
|
||||
CVE-2025-29405,0,0,2b1de6e84d9d8c71b0d66c8d66f707c8051e16cad3e287b6a763e4cd0c6ad79e,2025-03-19T19:15:49.567000
|
||||
CVE-2025-29410,1,1,390cb89330efa1f41cf2ddb4072dd5949306c46e31251cd2d9ed83b1ed28156e,2025-03-20T14:15:24.540000
|
||||
CVE-2025-29412,1,1,335f6fb03617019443f56489e785849608626f14314eef18f0de0ad063a26622,2025-03-20T14:15:24.653000
|
||||
CVE-2025-29425,0,0,093ec6e3d630ec63e64b9d502b6c3ce157d67185098d8bf640788edb6f541730,2025-03-19T19:15:49.697000
|
||||
CVE-2025-29426,0,0,ca5c399697b63e00d85ae3ac02bfa32554e49d24d7b16bfb13e68f3f5d9d962d,2025-03-19T19:15:49.830000
|
||||
CVE-2025-29427,0,0,4503f6be6491e147faa0bce916d074b949bff04ef067cf46ffc8e368d2ec7c2d,2025-03-19T19:15:49.970000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user